Lee et al., 2001
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Lee et al. | Real time data mining-based intrusion detection | |
| Cai et al. | Structural temporal graph neural networks for anomaly detection in dynamic graphs | |
| Dokas et al. | Data mining for network intrusion detection | |
| Nguyen et al. | Design and implementation of intrusion detection system using convolutional neural network for DoS detection | |
| Eskin et al. | Adaptive model generation for intrusion detection systems | |
| Mukkamala et al. | Detecting denial of service attacks using support vector machines | |
| Devi et al. | A Review Paper on IDS in Edge Computing or EoT | |
| Abraham et al. | Soft computing models for network intrusion detection systems | |
| Lappas et al. | Data mining techniques for (network) intrusion detection systems | |
| Alserhani | Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack | |
| Al-Subaie et al. | Efficacy of hidden Markov models over neural networks in anomaly intrusion detection | |
| Novikov et al. | Artificial intelligence approaches for intrusion detection | |
| Li et al. | Grid‐and dummy‐cluster‐based learning of normal and intrusive clusters for computer intrusion detection | |
| Lagzian et al. | Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios | |
| Michailidis et al. | Intrusion detection using evolutionary neural networks | |
| Rawat et al. | A fast host-based intrusion detection system using rough set theory | |
| Alserhani | A framework for multi-stage attack detection | |
| Shin et al. | Applying data mining techniques to analyze alert data | |
| Wenke Lee et al. | Real Time Data Mining-based Intrusion Detection zyxwvutsrqponm | |
| Eskin et al. | Real Time Data Mining-based Intrusion Detection | |
| Wang et al. | Measuring false-positive by automated real-time correlated hacking behavior analysis | |
| Wang et al. | Network intrusion detection with workflow feature definition using bp neural network | |
| Shin et al. | An alert data mining framework for network-based intrusion detection system | |
| Raut et al. | Intrusion detection system using data mining approach | |
| Li et al. | Mining normal and intrusive activity patterns for computer intrusion detection |