Author:
Altwaijry Hesham,Algarny Saeed
Reference17 articles.
1. Agarwal, R., Joshi, M.V., 2000. “PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection),” Department of Computer Science, University of Minnesota TR 00-015.
2. Rule generalization in intrusion detection systems using SNORT;Aickelin;International Journal of Electronic Security and Digital Forensics,2007
3. Alkabani, Y.M., El-Kharashi, M.W., Bedor, H.S., 2006. Hardware/software partitioning of a Bayesian spam filter via hardware profiling. In: IEEE International Symposium on Industrial Electronics, Montreal, Canada, pp. 3264–3269.
4. Bace, R., Mell, P., 2001. NIST Special Publication on Intrusion Detection Systems. National Institute of Standards and Technology.
5. Cemerlic, A., Yang, L., Kizza, J.M., 2008. Network intrusion detection based on Bayesian networks. In: Proceedings of the Twentieth International Conference on SOftware Engineering and Knowledge Engineering (SEKE’2008), San Francisco, CA, USA, pp. 791–794.
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献