Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
2013 ◽
Vol 6
(5)
◽
pp. 165-174
◽
Mahsa Khosronejad
◽
Elham Sharififar
◽
Hasan Ahmadi Torshizi
◽
Mehrdad Jalali
2011 ◽
Vol 30
(4)
◽
pp. 221-241
◽
Davide Ariu
◽
Roberto Tronci
◽
Giorgio Giacinto
2012 ◽
Vol 4
◽
pp. 506-514
◽
Nagaraju Devarakonda
◽
Srinivasulu Pamidi
◽
V. Valli Kumari
◽
A. Govardhan
2012 ◽
Vol 3
(3)
◽
pp. 210
◽
L. Coppolino
◽
L. Romano
◽
A. Bondavalli
◽
A. Daidone
Do-hyeon Lee
◽
Doo-young Kim
◽
Jae-il Jung
Do-hyeon Lee
◽
Doo-young Kim
◽
Jae-il Jung
Ye Du
◽
Huiqiang Wang
◽
Yonggang Pang
2013 ◽
Vol 10
(3)
◽
pp. 66-70
◽
2019 ◽
Vol 163
◽
pp. 611-623
◽
Junwei Liang
◽
Maode Ma
◽
Muhammad Sadiq
◽
Kai-Hau Yeung
Jongho Choy
◽
Sung-Bae Cho
Román Posadas
◽
Carlos Mex-Perera
◽
Raúl Monroy
◽
Juan Nolazco-Flores