Author:
Aissa Naila Belhadj,Guerroumi Mohamed
Reference23 articles.
1. An Intrusion-Detection Model;Denning;Software Engineering, IEEE Transactions on,1987
2. S. Axelsson, ‘Intrusion Detection Systems: A Survey and Taxonomy’, (Technical report, 2000).
3. Intrusion Detection Systems (Ids) Taxonomy-a Short Review;Amer;Defense Cyber Security,2010
4. A Survey of Network Anomaly Detection Techniques;Mohiuddin;Journal of Network and Computer Applications,2016
5. N. Belhadj Aissa, and M. Guerroumi, ‘A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems’, in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International Conference on (IEEE, 2015), pp. 1-6.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献