Author:
Khreich Wael,Khosravifar Babak,Hamou-Lhadj Abdelwahab,Talhi Chamseddine
Funder
Natural Sciences and Engineering Research Council of Canada
Defence Research and Development Canada
Subject
Computer Science Applications,Information Systems,Software
Reference68 articles.
1. An intrusion detection model;Denning,1986
2. Defending yourself: the role of intrusion detection systems;McHugh;IEEE Softw.,2000
3. Intrusion detection systems: a survey and taxonomy;Axelsson,2000
4. Intrusion detection system: a comprehensive review;Liao;J. Netw. Comput. Appl.,2013
5. Casting out demons: sanitizing training data for anomaly sensors;Cretu,2008
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献