Subject
Artificial Intelligence,Cognitive Neuroscience,Computer Science Applications
Reference27 articles.
1. K. Grahn, M. Westerlund, G. Pulkkis, Analytics for Network Security: A Survey and Taxonomy, in: I.M. Alsmadi, G. Karabatis, A. Aleroud (Eds.), Information Fusion for Cyber-Security Analytics, Springer International Publishing, Cham, 2017: pp. 175–193. https://doi.org/10.1007/978-3-319-44257-0_8.
2. M. Panda, M. Patra, Network intrusion detection using naive bayes, 7 (2007).
3. Support vector machine and random forest modeling for intrusion detection system (IDS);Hasan;J. Intell. Learn. Syst. Appl.,2014
4. M. Tavallaee, E. Bagheri, W. Lu, A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, IEEE Symposium. Computational Intelligence for Security and Defense Applications, CISDA. 2 (2009). https://doi.org/10.1109/CISDA.2009.5356528.
5. Pattern recognition and machine learning;Bishop;J. Electron. Imaging,2006
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献