Subject
Law,General Computer Science
Reference168 articles.
1. Efficient decision tree for protocol analysis in intrusion detection;Abbes;Int. J. Secur. Netw.,2010
2. ADFA-LD, 2013. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-IDS-Datasets/.
3. A survey of network anomaly detection techniques;Ahmed;J. Netw. Comput. Appl.,2016
4. Adversarial machine learning in network intrusion detection systems;Alhajjar;Expert Syst Appl,2021
5. Detecting distributed denial of service attacks using data mining techniques;Alkasassbeh;Int. J. Adv. Comput. Sci. Appl.,2016
Cited by
134 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献