Author:
Sethuraman Sibi Chakkaravarthy,Jadapalli Tharshith Goud,Sudhakaran Devi Priya Vimala,Mohanty Saraju P.
Subject
General Computer Science,Theoretical Computer Science
Reference139 articles.
1. CrowdStrike:2022 global threat report;crowdstrikereport,2022
2. An overview of automotive service-oriented architectures and implications for security countermeasures;Rumez;IEEE Access,2020
3. Intrusion detection systems (IDS)—An overview with a generalized framework;Panigrahi,2020
4. ITL-IDS: Incremental transfer learning for intrusion detection systems;Mahdavi;Knowl.-Based Syst.,2022
5. Deduplication on encrypted big data in cloud;Yan;IEEE Trans. Big Data,2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing Cybersecurity Resilience: Integrating IDS with Advanced Honeypot Environments for Proactive Threat Detection;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
2. A comprehensive survey on cyber deception techniques to improve honeypot performance;Computers & Security;2024-05
3. Guardian Box through Honeypot Using Shielded Socket for Linux Distribution;2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS);2024-04-18
4. Exploring Deep Learning Architectures for Enhanced Cyber Threat Detection: A Survey;2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG);2024-04-02