Pierre et al., 2022
| Publication | Publication Date | Title |
|---|---|---|
| US11509683B2 (en) | System and method for securing a network | |
| Tufan et al. | Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Bhattacharyya et al. | DDoS attacks: evolution, detection, prevention, reaction, and tolerance | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| Corona et al. | Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues | |
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Gu et al. | Bothunter: Detecting malware infection through ids-driven dialog correlation. | |
| Kumar et al. | Intrusion detection systems: a review | |
| Thomas | Improving intrusion detection for imbalanced network traffic | |
| Deka et al. | Network defense: Approaches, methods and techniques | |
| Wang et al. | Using honeypots to model botnet attacks on the internet of medical things | |
| Möller | Intrusion detection and prevention | |
| Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
| Melo et al. | ISM-AC: An immune security model based on alert correlation and software-defined networking | |
| Zekrifa | Hybrid Intrusion Detection System | |
| Huang | Human-centric training and assessment for cyber situation awareness | |
| Ramos et al. | A Machine Learning Based Approach to Detect Stealthy Cobalt Strike C &C Activities from Encrypted Network Traffic | |
| Pierre et al. | Hybrid machine learning mechanism for intrusion detection systems in network security | |
| Prayote | Knowledge based anomaly detection | |
| Nazir et al. | Combinatorial optimization based feature selection method: A study on network intrusion detection | |
| AlSharman et al. | A Detailed Inspection of Machine Learning Based Intrusion Detection Systems for Software Defined Networks. | |
| Thomas et al. | Performance enhancement of intrusion detection systems using advances in sensor fusion | |
| Alqahtani | The detection of Advanced Persistent Threats in Software Defined Networks using Machine Learning |