Subject
Materials Chemistry,Economics and Econometrics,Media Technology,Forestry
Reference116 articles.
1. Computer Security Technology Planning Study, Vol. 2;Anderson,1972
2. A survey of intrusion detection systems leveraging host data;Bridges;ACM Comput. Surv.,2020
3. Computer Security Principles and Practice (4th Edition);Stallings,2018
4. Neural Networks: A Comprehensive Foundation;Haykin,1999
5. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun. Surv. Tutor.,2016
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献