Author:
Renjit J. Arokia,Shunmuganathan K. L.
Subject
Information Systems and Management,Computer Science Applications,Software
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Machine Learning Approach to Analyze Cloud Computing Attacks;2022 5th International Conference on Contemporary Computing and Informatics (IC3I);2022-12-14
2. Real-time reliable clustering and secure transmission scheme for QoS development in MANET;Peer-to-Peer Networking and Applications;2021-06-15
3. A comprehensive survey and taxonomy of the SVM-based intrusion detection systems;Journal of Network and Computer Applications;2021-03
4. Improving security using SVM-based anomaly detection: issues and challenges;Soft Computing;2020-10-17
5. Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms;2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC);2017-12