Cited By
View all- Jin ZCui YYan Z(2019)Survey of Intrusion Detection Methods Based on Data Mining AlgorithmsProceedings of the 2019 International Conference on Big Data Engineering10.1145/3341620.3341632(98-106)Online publication date: 11-Jun-2019
- Shah SIssac B(2018)Performance comparison of intrusion detection systems and application of machine learning to Snort systemFuture Generation Computer Systems10.1016/j.future.2017.10.01680:C(157-170)Online publication date: 1-Mar-2018
- De La Peña Montero FHariri SAnjum ASill AFox GChen Y(2017)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)Companion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148137(107-112)Online publication date: 5-Dec-2017
- Show More Cited By