Author:
Kanimozhi V.,Jacob T. Prem
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference8 articles.
1. Przemyslaw Kazienko, . Dorosz, Intrusion Detection Systems IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture).
2. Compression analytics for classification and anomaly detection within network communication;Ting;IEEE Trans. Inf. Forensics Secur.,2018
3. Internetattacks and intrusion detection system: A review of the iterature;Singh;Online Inform. Rev.,2017
4. Network Traffic Anomaly Detection and Prevention;Bhuyan,2017
5. Iman Sharafaldin, . ArashHabibiLashkari, Ali A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献