Blog
About

13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references 65

          • Record: found
          • Abstract: not found
          • Article: not found

          Fuzzy sets

           L.A. Zadeh (1965)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Multilayer feedforward networks are universal approximators

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The WEKA data mining software

                Bookmark

                Author and article information

                Journal
                IEEE Communications Surveys & Tutorials
                IEEE Commun. Surv. Tutorials
                Institute of Electrical and Electronics Engineers (IEEE)
                1553-877X
                22 2016
                22 2016
                : 18
                : 2
                : 1153-1176
                Article
                10.1109/COMST.2015.2494502
                © 2016

                Comments

                Comment on this article