• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4603666)   Today's Articles (276)   Subscriber (49370)
For: Kenyon A, Deka L, Elizondo D. Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102022] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
Pinto A, Herrera LC, Donoso Y, Gutierrez JA. Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. SENSORS (BASEL, SWITZERLAND) 2023;23:2415. [PMID: 36904618 PMCID: PMC10007329 DOI: 10.3390/s23052415] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/22/2022] [Revised: 02/16/2023] [Accepted: 02/20/2023] [Indexed: 06/18/2023]
2
Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103106] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/18/2023]
3
Díaz-Verdejo JE, Alonso RE, Estepa Alonso A, Madinabeitia G. A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102997] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
4
Datasets are not Enough: Challenges in Labeling Network Traffic. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102810] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
5
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app112412073] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
6
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data. ELECTRONICS 2021. [DOI: 10.3390/electronics10172160] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data. ELECTRONICS 2021. [DOI: 10.3390/electronics10131534] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA