Cyber Attack Detection Framework for Cloud Computing
暂无分享,去创建一个
[1] Glenn Shafer,et al. A Mathematical Theory of Evidence turns 40 , 2016, Int. J. Approx. Reason..
[2] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[3] Sang-Soo Yeo,et al. A novel method for SQL injection attack detection based on removing SQL query attribute values , 2012, Math. Comput. Model..
[4] Qihui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.
[5] John W. Lockwood,et al. Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..
[6] V. Jaiganesh,et al. Intrusion Detection Systems: A Survey and Analysis of Classification Techniques , 2013 .
[7] Andrei Vladyko,et al. A fuzzy logic-based information security management for software-defined networks , 2014, 16th International Conference on Advanced Communication Technology.
[8] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..