Author:
Verma Abhishek,Ranga Virender
Reference24 articles.
1. An overview of privacy and security issues in the internet of things. In The Internet of Things (pp. 389-395);Medaglia,2010
2. Towards a taxonomy of intrusion-detection systems;Debar;Computer Networks,1999
3. Zhengbing, H., Zhitang, L., & Junqi, W. (2008, January). A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. In Proceedings of the 1st international Conference on Forensic Applications and Techniques in Telecommunications, information, and Multimedia and Workshop (p. 45). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
4. Anomaly-based network intrusion detection: Techniques, systems and challenges;Garcia-Teodoro;Computers & security,2009
5. Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In Security and Privacy (SP), 2010 IEEE Symposium on (pp. 305-316). IEEE.
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献