Author:
Alqahtani Hamed,Sarker Iqbal H.,Kalim Asra,Minhaz Hossain Syed Md.,Ikhlaq Sheikh,Hossain Sohrab
Reference31 articles.
1. Kdd cup 99. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 20 Oct 2019
2. Aftergood, S.: Cybersecurity: the cold war online. Nature 547(7661), 30 (2017)
3. Ammar, A., Michael, H., Jemal, A., Moutaz, A.: Using feature selection for intrusion detection system. In: 2012 International Symposium on Communications and Information Technologies (ISCIT), pp. 296–301. IEEE (2012)
4. Amit, Y., Geman, D.: Shape quantization and recognition with randomized trees. Neural Comput. 9(7), 1545–1588 (1997)
5. Shahid, A., et al.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10(2), 39 (2017)
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献