Author:
Sahani Roma,Shatabdinalini ,Rout Chinmayee,Chandrakanta Badajena J.,Jena Ajay Kumar,Das Himansu
Reference30 articles.
1. Barbara, Daniel, et al.: ADAM: Detecting intrusions by data mining. In Proceedings of the IEEE Workshop on Information Assurance and Security. (2001): 11–16.
2. Swamy, K.V.R., and K.S. Vijaya Lakshmi: Network intrusion detection using improved decision tree algorithm. International Journal of Computer Science and Information Security 10.8 (2012): 4971–4975.
3. Farid, Dewan Md, et al.: “Attacks classification in adaptive intrusion detection using decision tree.” World Academy of Science, Engineering and Technology 63 (2010): 86–90.
4. IDS over Firewall, https://www.scribd.com/document/45263670/Limitations-Of-Firewall . January 2017.
5. Sarkar, Sutapa: High Performance Network Security Using NIDS Approach. International Journal of Information Technology and Computer Science (IJITCS) 6.7 (2014): 47–55.
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献