2010
DOI: 10.4304/jnw.5.4.475-483
|View full text |Cite
|
Sign up to set email alerts
|

A Cooperative Network Intrusion detection Based on Fuzzy SVMs

Abstract: The Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Several defense techniques may be applied in industrial networks. IDS are recognized as a strong line of defense mainly in situations with no other efficient cybersecurity mechanisms [19]. One evidence of this is the volume of studies related to these subjects.…”
Section: Shamoon Notpetyamentioning
confidence: 99%
See 3 more Smart Citations
“…Several defense techniques may be applied in industrial networks. IDS are recognized as a strong line of defense mainly in situations with no other efficient cybersecurity mechanisms [19]. One evidence of this is the volume of studies related to these subjects.…”
Section: Shamoon Notpetyamentioning
confidence: 99%
“…This situation is even worse in industrial networks based on serial protocols because of their limitations. So, if there is always a vulnerability that can be exploited, a system that performs analytical tests against anomalous patterns could be a second line of defense [19]. IDS often implement this type of protection in ICS [11], which is indicated to be present in any industrial networks [8], [13], [15].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
See 2 more Smart Citations