Author:
Zhong Ying,Chen Wenqi,Wang Zhiliang,Chen Yifan,Wang Kai,Li Yahui,Yin Xia,Shi Xingang,Yang Jiahai,Li Keqin
Funder
National Key Research and Development Program of China
National Engineering Lab
Subject
Computer Networks and Communications
Reference63 articles.
1. An intrusion-detection model;Denning;IEEE Trans. Softw. Eng.,1987
2. Outside the closed world: on using machine learning for network intrusion detection;Sommer;IEEE Symposium on Security and Privacy. IEEE Computer Society,2010
3. Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements;Casas;Comput. Netw.,2010
4. Evolutionary design of intrusion detection programs;Abraham;Int. J. Netw. Secur.,2007
5. A detailed investigation and analysis of using machine learning techniques for intrusion detection;Mishra;IEEE Communications Surveys & Tutorials,2019
Cited by
121 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献