Author:
Amaral Alexandre Aguiar,Mendes Leonardo de Souza,Zarpelão Bruno Bogaz,Junior Mario Lemes Proença
Subject
Computer Networks and Communications
Reference56 articles.
1. Article: network attacks and their detection mechanisms: a review;Mangrulkar;Int. J. Comput. Appl.,2014
2. Detecting anomalous network traffic in organizational private networks;Vaarandi,2013
3. Network anomaly detection: methods, systems and tools;Bhuyan;Commun. Surv. Tutorials IEEE,2014
4. A survey on networking games in telecommunications;Altman;Comput. Oper. Res.,2006
5. Anomaly extraction in backbone networks using association rules;Brauckhoff;Netw. IEEE/ACM Trans.,2012
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. NEP-IDS: a Network Intrusion Detection System Based on Entropy Prediction Error;2024 IEEE 49th Conference on Local Computer Networks (LCN);2024-10-08
2. Research on Intrusion Detection Based on Markov Chain Monte Carlo Method;2023 2nd International Conference on Cloud Computing, Big Data Application and Software Engineering (CBASE);2023-11-03
3. Community deception in directed influence networks;Social Network Analysis and Mining;2023-09-25
4. Cortex-inspired ensemble based network intrusion detection system;Neural Computing and Applications;2023-04-11
5. Anomaly detection and community detection in networks;Journal of Big Data;2022-12-22