Author:
Baby Jesuretnam Josemila,Jeba James Rose
Subject
Management of Technology and Innovation,Physics and Astronomy (miscellaneous),Engineering (miscellaneous)
Reference20 articles.
1. Sobh, Tarek S. "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art." Computer Standards & Interfaces 28, no. 6 (2006): 670-694.
2. Aydın, M. Ali, A. Halim Zaim, and K. GökhanCeylan. "A hybrid intrusion detection system design for computer network security." Computers & Electrical Engineering 35, no. 3 (2009): 517-526.
3. Raymond, Jean-François. "Traffic analysis: Protocols, attacks, design issues, and open problems." In Designing Privacy Enhancing Technologies, pp. 10-29. Springer, Berlin, Heidelberg, 2001.
4. Tsai, Chih-Fong, Yu-Feng Hsu, Chia-Ying Lin, and Wei-Yang Lin. "Intrusion detection by machine learning: A review." expert systems with applications 36, no. 10 (2009): 11994-12000.
5. Debar, Hervé, Marc Dacier, and Andreas Wespi. "A revised taxonomy for intrusion-detection systems." In Annales des télécommunications, vol. 55, no. 7-8, pp. 361-378. Springer-Verlag, 2000.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Optimising Intrusion Detection Through Long Short-Term Memory Model;2024 International Conference on Advances in Modern Age Technologies for Health and Engineering Science (AMATHE);2024-05-16