De La Peña Montero et al., 2017
| Publication | Publication Date | Title | 
|---|---|---|
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Patel et al. | An intrusion detection and prevention system in cloud computing: A systematic review | |
| Dastres et al. | A review in recent development of network threats and security measures | |
| US11700269B2 (en) | Analyzing user behavior patterns to detect compromised nodes in an enterprise network | |
| Chiba et al. | A survey of intrusion detection systems for cloud computing environment | |
| Sandhu et al. | A survey of intrusion detection & prevention techniques | |
| Anwar et al. | Response option for attacks detected by intrusion detection system | |
| Letou et al. | Host-based intrusion detection and prevention system (HIDPS) | |
| Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
| Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
| Hnamte et al. | Enhancing security in software-defined networks: An approach to efficient ARP spoofing attacks detection and mitigation | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Gajjar et al. | A survey of intrusion detection system (IDS) using OpenStack private cloud | |
| Tayyebi et al. | Cloud security through Intrusion Detection System (IDS): Review of existing solutions | |
| Leghris et al. | Improved security intrusion detection using intelligent techniques | |
| Foo et al. | Intrusion response systems: a survey | |
| Chatterjee | An efficient intrusion detection system on various datasets using machine learning techniques | |
| Samani et al. | Intrusion detection system for DoS attack in cloud | |
| Patel et al. | An architecture of hybrid intrusion detection system | |
| De La Peña Montero et al. | Autonomic and integrated management for proactive cyber security (AIM-PSC) | |
| Kaur et al. | Honeypots and honeynets: investigating attack vectors | |
| Kishore et al. | Intrusion detection system a need | |
| Singh et al. | A review on intrusion detection system | |
| Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
| Poonia et al. | Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis |