Carver Jr et al., 2000
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US11522887B2 (en) | Artificial intelligence controller orchestrating network components for a cyber threat defense | |
| Devi et al. | Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments | |
| Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
| Mukherjee et al. | Network intrusion detection | |
| Garcia-Teodoro et al. | Anomaly-based network intrusion detection: Techniques, systems and challenges | |
| Lundin et al. | Survey of intrusion detection research | |
| CN119449428A (en) | Cross-domain network security strategy automatic generation and protection strategy collaboration method and system | |
| CN119205351A (en) | A method and device for tracking and tracing asset risks | |
| Rajasekar et al. | Security analytics | |
| Labib | Computer security and intrusion detection | |
| Carver Jr | Adaptive agent-based intrusion response | |
| Xiao et al. | SENTINEL: Insider threat detection based on multi-timescale user behavior interaction graph learning | |
| Suresh et al. | Detection of malicious activities by AI-Supported Anomaly-Based IDS | |
| Sallay et al. | Intrusion detection alert management for high‐speed networks: current researches and applications | |
| Rastogi et al. | Network anomalies detection using statistical technique: a chi-square approach | |
| Li | An approach to graph-based modeling of network exploitations | |
| Prabu et al. | An automated intrusion detection and prevention model for enhanced network security and threat assessment | |
| Lakra | HSNORT: A Hybrid intrusion detection system using artificial intelligence with snort | |
| Gong | Intrusion detection model based on security knowledge in online network courses | |
| Carver Jr et al. | Real-time Intrusion Detection Systems | |
| Yampolskiy et al. | Computer security: A survey of methods and systems | |
| Avkurova et al. | Structural and analytical models for early apt-attacks detection in critical infrastructure | |
| Solanki et al. | Intrusion detection technique using data mining approach: survey | |
| Nalavade et al. | Intrusion prevention systems: data mining approach | |
| Ahmad et al. | Hybrid intrusion detection method to increase anomaly detection by using data mining techniques |