Author:
Platonov V. V.,Semenov P. O.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference8 articles.
1. The Internet of Things Reference Model. http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_ Paper_June_4_2014.pdf.
2. Bhattacharyya, D.K. and Kalita, J.K., Network Anomaly Detection. A Machine Learning Perspective, CRC Press, 2014.
3. Khan, M.S.A., Rule based network intrusion detection using genetic algorithm, Int. J. Comput. Appl., 2011, no. 8, pp. 26–29.
4. Lee, S.C. and Heinbuch, D.V., Training a neural-network based intrusion detector to recognize novel attacks, IEEE Trans. Syst. Man Cybern.: Part A, 2001, vol. 31, no. 4, pp. 294–299.
5. Mabu, S., Chen, C., Lu, N., Shimada, K., and Hirasawa, K., An intrusion-detection model based on fuzzy class association-rule mining using genetic network programming, IEEE Trans. Syst. Man Cybern., Part C: Appl. Rev., 2011, vol. 41, no. 1, pp. 130–139.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献