Academic literature on the topic 'Computer networks Outliers (Statistics) Anomaly detection (Computer security)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Outliers (Statistics) Anomaly detection (Computer security).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks Outliers (Statistics) Anomaly detection (Computer security)"
Wang, Yajing, Juan Ma, Ashutosh Sharma, et al. "An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks." Journal of Sensors 2021 (May 28, 2021): 1–11. http://dx.doi.org/10.1155/2021/5558860.
Full textAbuadlla, Yousef, Goran Kvascev, Slavko Gajin, and Zoran Jovanovic. "Flow-based anomaly intrusion detection system using two neural network stages." Computer Science and Information Systems 11, no. 2 (2014): 601–22. http://dx.doi.org/10.2298/csis130415035a.
Full textDissertations / Theses on the topic "Computer networks Outliers (Statistics) Anomaly detection (Computer security)"
Liu, Ying. "Outlier detection by network flow." Birmingham, Ala. : University of Alabama at Birmingham, 2007. https://www.mhsl.uab.edu/dt/2007p/liu-ying.pdf.
Full textGu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.
Full textAlkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Full textBook chapters on the topic "Computer networks Outliers (Statistics) Anomaly detection (Computer security)"
Duy, Phan The, Nghi Hoang Khoa, Hoang Hiep, et al. "A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2021. http://dx.doi.org/10.3233/faia210031.
Full text