Author:
Sheikhan Mansour,Bostani Hamid
Reference54 articles.
1. On the symbiosis of specification-based and anomaly-based detection;Stakhanova;Computers & Security,2010
2. An efficient hybrid intrusion detection system based on C5.0 and SVM;Golmah;International Journal of Database Theory and Application,2014
3. Machine Learning Techniques for Intrusion Detection;Zamani,2013
4. The use of computational intelligence in intrusion detection systems: a review;Wu;Applied Soft Computing,2010
5. Supervised pattern classification based on optimum-path forest;Papa;International Journal of Imaging Systems and Technology,2009
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献