15 results on '"Ghorbani, Ali"'
Search Results
2. Alert Management and Correlation
3. Intrusion Response
4. Evaluation Criteria
5. Theoretical Foundation of Detection
6. Detection Approaches
7. Architecture and Implementation
8. Data Collection
9. A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection
10. Using Fuzzy System to Manage False Alarms in Intrusion Detection
11. Verification Based Scheme to Restrict IoT Attacks
12. Application of deep learning to cybersecurity: A survey.
13. Improved competitive learning neural networks for network intrusion and fraud detection
14. Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.
15. VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.