Publisher
Springer International Publishing
Reference24 articles.
1. The 1998 DARPA intrusion detection evaluation dataset. https://www.ll.mit.edu/r-d/datasets/1998-darpa-intrusion-detection-evaluation-dataset. Accessed 10 May 2022
2. DDoS evaluation dataset (CICDDoS2019). https://www.unb.ca/cic/datasets/ddos-2019.html. Accessed 10 May 2022
3. Intrusion detection evaluation dataset (ISCXIDS2012). https://www.unb.ca/cic/datasets/ids.html. Accessed 10 May 2022
4. Behal, S., Kumar, K.: Detection of DDoS attacks and flash events using information theory metrics-an empirical investigation. Comput. Commun. 103, 18–28 (2017). https://doi.org/10.1016/j.comcom.2017.02.003. http://www.sciencedirect.com/science/article/pii/S0140366417301718
5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1–58 (2009)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DDoS Attacks Analysis with Cyber Data Forensics using Weighted Logistic Regression and Random Forest;2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT);2023-03-17