Author:
Zola F.,Segurola-Gil L.,Bruse J.L.,Galar M.,Orduna-Urrutia R.
Subject
Law,General Computer Science
Reference94 articles.
1. An introduction to outlier analysis;Aggarwal,2017
2. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate;Agrafiotis;Journal of Cybersecurity,2018
3. Graph based anomaly detection and description: a survey;Akoglu;Data mining and knowledge discovery,2015
4. 1d CNN based network intrusion detection with normalization on imbalanced data;Azizjon,2020
5. Performance evaluation of intrusion detection based on machine learning using apache spark;Belouch;Procedia Computer Science,2018
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献