Author:
Freas Christopher B.,Harrison Robert W.
Publisher
Springer International Publishing
Reference16 articles.
1. ACM SIGKDD: KDD Cup 1999: Computer network intrusion detection.
http://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data
2. Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 75–88. ACM (2008)
3. ClamavNet: ClamAV is an open source antivirus engine for detecting trojans, viruses, malware & other malicious threats.
https://www.clamav.net/
. Accessed 26 May 2019
4. Freas, C.B., Harrison, R.W., Long, Y.: High performance attack estimation in large-scale network flows. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5014–5020. IEEE (2018)
5. Google: Tensorflow for Javascript.
https://www.tensorflow.org/js
. Accessed 26 May 2019