Author:
Kumar Abhishek,Pandey Dilkeshwar
Reference27 articles.
1. “Tevens T. Cyber security and the politics of time. Cambridge University Press; 2016.”.
2. “Miller NJ, Aliasgari M. Benchmarks for evaluating anomaly-based intrusion detection solutions. California State University, Long Beach; 2018”.
3. “A Review of the Advancement in Intrusion Detection Datasets”.
4. Analysis of Host-Based and Network-Based Intrusion Detection System
5. A. Patil, A. Laturkar, S. V. Athawale, R. Takale, and P. Tathawade, “A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security,” in 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), Aug. 2017, pp. 1–7.