Cited By
View all- Sun XZhang DQin HTang J(2022)Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine LearningSecurity and Communication Networks10.1155/2022/39903862022Online publication date: 1-Jan-2022
- Gómez JGil CBaños RMárquez AMontoya FMontoya M(2011)A multi-objective evolutionary algorithm for network intrusion detection systemsProceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I10.5555/2023252.2023264(73-80)Online publication date: 8-Jun-2011
- Pu LFaltings BYang QHu DGreenstadt R(2010)Relational network-service clustering analysis with set evidencesProceedings of the 3rd ACM workshop on Artificial intelligence and security10.1145/1866423.1866432(35-44)Online publication date: 8-Oct-2010