Open Access
Issue
ITM Web Conf.
Volume 45, 2022
2021 3rd International Conference on Computer Science Communication and Network Security (CSCNS2021)
Article Number 01003
Number of page(s) 5
Section Computer Technology and System Design
DOI https://doi.org/10.1051/itmconf/20224501003
Published online 19 May 2022
  1. Ke Bao; Yourong Ding. Network security analysis using big data technology and improved neural network. Journal of Ambient Intelligence and Humanized Computing, 2020. p.1-11 [Google Scholar]
  2. Zhao, J.-H.A.W.-H.L., Intrusion Detection Based on Improved SOM with Optimized GA. Journal of Computers, 2013. 8(6): p. 1456-63. [Google Scholar]
  3. Chung, C.-J., et al., NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. Ieee Transactions on Dependable and Secure Computing, 2016. 10(4): p. 198-211. [Google Scholar]
  4. Hubballi, N., S. Biswas, and S. Nandi, Towards reducing false alarms in network intrusion detection systems with data summarization technique. Security and Communication Networks, 2018. 6(3): p. 275-285. [Google Scholar]
  5. Ruijuan, Z., et al., Analysis and application of Bio-Inspired Multi-Net Security Model. International Journal of Information Security, 2015. 9(1): p. 1-17. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.