13
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Fast location algorithm for complex dynamic network invasion data

&
Pages 1483-1488 | Received 01 Apr 2017, Published online: 20 Dec 2017

References

  • Y. Z. Deng. Model Simulation of Fast Positioning for Large Cloud Computing Network Intrusion Data. Computer Simulation, 33(2016) 348–351.
  • R. Morla R, P. Gonçalves, J. G. Barbosa. High-performance network traffic analysis for continuous batch intrusion detection. Journal of Supercomputing, 72(2016) 1–22. doi: 10.1007/s11227-016-1743-6
  • M. Mansouri, M. T. Golsefid, N. Nematbakhsh. A Hybrid Intrusion Detection System Based on Multilayer Artificial Neural Network and Intelligent Feature Selection. Archives of Medical Research, 44(2015) 266–272.
  • M. Andreolini, M. Colajanni, M. Marchetti. A collaborative framework for intrusion detection in mobile networks. Information Sciences, 321(2015) 179–192. doi: 10.1016/j.ins.2015.03.025
  • Y. Shi, Z. Chen, B. Sun. Intrusion detection model based on improved multilayer condensation algorithm. Application Research of Computers, 32(2016) 518–520.
  • C. Karadkar, K. Thuturkar, K. Ghatole, et al. Review on Implementation of Intrusion Detection in Physical Network. Cancer Research, 20(2015) 66–69.
  • S. H. Pi, B. J. Wang, D. Zhao, et al. Multi-resolution intrusion localization algorithm through cepstrum in distributed fiber optic Sagnac interferometer. Acta Physica Sinica, 65(2016) 139–147.
  •  M. Ambusaidi, X. He, P. Nanda, et al. Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65(2016) 2986–2998. doi: 10.1109/TC.2016.2519914
  • T. Zhang, J. P. Wang. Network intrusion detection based on cooperative quantum-behaved particle swarm algorithm and least square support vector machine. Computer Engineering and Applications, 51(2015) 113–116.
  • M. M. Rathore, A. Ahmad, A. Paul. Real time intrusion detection system for ultra-high-speed big data environments. Journal of Supercomputing, 72(2016) 3489–3510. doi: 10.1007/s11227-015-1615-5

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.