Author:
Karim Kayvan,Ragab Hassen Hani,Batatia Hadj
Publisher
Springer Nature Switzerland
Reference11 articles.
1. Ring, M., Wunderlich, S., Gruedl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. In: Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS), pp. 361-369. ACPI (2017)
2. Jadidi Z, Muthukkumarasamy V, Sithirasenan E, Sheikhan M. Flow-based anomaly detection using neural network optimized with GSA algorithm. In2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 76-81. IEEE, 8 July 2013
3. Ring, M., Schlör, D., Landes, D., Hotho, A.: Flow-based network traffic generation using generative adversarial networks. Comput. Secur. 82, 156–172 (2018)
4. Wu, J., Wang, W., Huang, L., Zhang, F.: Intrusion detection technique based on flow aggregation and latent semantic analysis. Appl. Soft Comput. 127, 109375 (2022)
5. Ring, M., Dallmann, A., Landes, D., Hotho, A.: IP2Vec: learning similarities between IP addresses.’ In: 2017 IEEE International Conference on Data Mining Workshops, ICDMW, vol. 2017, pp. 657-666 (2017)