Author:
Lavanya P.,Singh Rimjhim Padam,Kumaran U.,Kumar Priyanka
Reference22 articles.
1. http://www.getastra.com/blog/security-audit/recent-cyber-attacks/
2. Decision tree pairwise metric learning against adversarial attacks;Appiah;Computers & Security,2021
3. Gokul, A., Sarath, J. N., Mohit, M., Niranjan, M., & Nair, A. K. (2021, June). Intrusion Detection In Computer Networks Using Machine Learning Algorithms. In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT) (pp. 605-611). IEEE..
4. Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525-41550..
5. Kumaran, U. (2021). A secure and privacy-preserving approach to protect user data across cloud based online social networks. In Research Anthology on Artificial Intelligence Applications in Security (pp. 560-585). IGI Global.