Author:
Tulu Merid Nigussie,Hailu Tulu Tilahun,Sharma Durga Prasad
Publisher
Springer Nature Singapore
Reference23 articles.
1. US-CERT federal incident notification guidelines | US-CERT. https://www.us-cert.gov/incident-notification-guidelines. Accessed 03 Mar 2017
2. Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput J 10:1–35
3. Lu CT, Boedihardjo AP, Manalwar P (2005) Exploiting efficient data mining techniques to enhance intrusion detection systems. 0-7803-9093-8/05/$20.00. IEEE, pp 512–517
4. Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346
5. KDD-CUP-99 task description. http://kdd.ics.uci.edu/databases/kddcup99/task.html. Accessed 02 Mar 2017