Author:
Haider W.,Hu J.,Slay J.,Turnbull B.P.,Xie Y.
Funder
ARC
Natural Science Foundation of Guangdong Province
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference26 articles.
1. A survey of network anomaly detection techniques;Ahmed;J. Netw. Comput. Appl.,2016
2. The crutial way of critical infrastructure protection;Bessani;IEEE Secur. Priv.,2008
3. Creech, G., Hu, J., 2013. Generation of a new ids test dataset: Time to retire the kdd collection. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 4487–4492.
4. Creech, 2014. Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks. (Ph.D. thesis). University of New South Wales.
5. Davis, J., Magrath, S., 2013. A survey of cyber ranges and testbeds. Tech. Rep., DTIC Document.
Cited by
138 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献