Real Time Intrusion Detection System for Big Data

[1]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[2]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[3]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[4]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[5]  Stephen J. Cohen,et al.  A Decision Framework for Cloud Computing , 2012, 2012 45th Hawaii International Conference on System Sciences.

[6]  Michael Stonebraker,et al.  Researchers' big data crisis; understanding design and functionality , 2012, Commun. ACM.

[7]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.