Author:
Yahalom Ran,Steren Alon,Nameri Yonatan,Roytman Maxim,Porgador Angel,Elovici Yuval
Funder
KAMIN program of the Israel Innovation Authority
Subject
Artificial Intelligence,Information Systems and Management,Management Information Systems,Software
Reference52 articles.
1. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun. Surv. Tutor.,2016
2. A machine learning framework for network anomaly detection using SVM and GA;Shon,2005
3. A hybrid machine learning approach to network anomaly detection;Shon;Inf. Sci. (Ny).,2007
4. Anomaly-based network intrusion detection: Techniques, systems and challenges;García-Teodoro;Comput. Secur.,2009
5. A close look on n -grams in intrusion detection;Wressnegger,2013
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献