Lu et al., 2003
| Publication | Publication Date | Title |
|---|---|---|
| Jing et al. | Security data collection and data analytics in the internet: A survey | |
| Abad et al. | Log correlation for intrusion detection: A proof of concept | |
| Corona et al. | Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues | |
| Kumar | Survey of current network intrusion detection techniques | |
| McHugh | Intrusion and intrusion detection | |
| Zeidanloo et al. | A taxonomy of botnet detection techniques | |
| Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
| Deka et al. | Network defense: Approaches, methods and techniques | |
| Zhang et al. | User intention-based traffic dependence analysis for anomaly detection | |
| Sequeira | Intrusion prevention systems: security's silver bullet? | |
| Bhardwaj et al. | Detection of cyber attacks: Xss, sqli, phishing attacks and detecting intrusion using machine learning algorithms | |
| Nazir et al. | Network intrusion detection: Taxonomy and machine learning applications | |
| Raftopoulos et al. | IDS alert correlation in the wild with EDGe | |
| Lu et al. | An adaptive real-time intrusion detection system using sequences of system call | |
| Barabas et al. | Behavioral signature generation using shadow honeypot | |
| Raut | Log based intrusion detection system | |
| Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
| Kissoon et al. | An Analysis of Key Tools for Detecting Cross-Site Scripting Attacks on Web-Based Systems | |
| Balzarotti | Testing network intrusion detection systems. | |
| Herwono et al. | A system for detecting targeted cyber-attacks using attack patterns | |
| Herwono et al. | A Collaborative Tool for Modelling Multi-stage Attacks. | |
| De La Peña Montero et al. | Autonomic and integrated management for proactive cyber security (AIM-PSC) | |
| US20250141901A1 (en) | Web application and application programming interface (api) protection | |
| Gomathi et al. | Identification of Network Intrusion in Network Security by Enabling Antidote Selection | |
| Pierre et al. | Hybrid machine learning mechanism for intrusion detection systems in network security |