Author:
Nagalakshmi T.J.,Balasaraswathi M.,Sivasankaran V.,Ravikumar D.,Joseph Gladwin S.,Pravin Kumar S.
Reference17 articles.
1. R.BaceandP.Mell “Intrusion Detection Systems ”2001.http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf
2. A survey of random forest based methods for intrusion detection systems;Paulo angelo alves resende and andré costa drummond;ACM Comp. Sur.,2018
3. T.Jackson J.Levine J.Grizzard andH.Owen “An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network.” InProceedings of the 2004 IEEE Workshop on Information Assurance and Security 2004; pp.9–14.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献