Author:
Maheswaran N.,Bose S.,Logeswari G.,Anitha T.
Publisher
Springer Nature Singapore
Reference15 articles.
1. Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Ann. Télécommun. 55, 361–378 (2000)
2. Agarwal, N., Hussain, S.Z.: A closer look at intrusion detection system for web applications. Secur. Commun. Netw. 27 (2018)
3. Khraisat, A., Gondal, I., Vamplew, P., et al.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019)
4. Lunt, T., Jagannathan, R., Lee, Whitehurst, A., Listgarten, S.: Knowledge-based intrusion detection. In: 1989 The Annual AI Systems in Government Conference, pp. 102–107. Washington, DC, USA (1989)
5. Injadat, M., Moubayed, A., Nassif, A.B., Shami, A.: Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manage. 18, 1803–1816 (2021)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modified Whale Algorithm and Morley PSO-ML-Based Hyperparameter Optimization for Intrusion Detection;International Journal of Image and Graphics;2024-07-10
2. Network Anomaly Based Detection Using Multivariate Correlation Analysis Technique;2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS);2023-12-14
3. MS3F: Maximizing Bandwidth and Data Transmission Performance in SUCCESS-HPON Architecture for WDM-PON Using AI Techniques;2023 Second International Conference on Advances in Computational Intelligence and Communication (ICACIC);2023-12-07
4. Effective Intrusion Detection System using Hybrid Ensemble Method for Cloud Computing;2023 Second International Conference on Advances in Computational Intelligence and Communication (ICACIC);2023-12-07
5. Defending Web Applications against Malicious Traffic: Leveraging Machine Learning for Enhanced Security;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01