Author:
Kopmann Samuel,Heseding Hauke,Zitterbart Martina
Publisher
Springer Nature Switzerland
Reference16 articles.
1. Intrusion detection evaluation dataset (cic-ids2017) (2017). https://www.unb.ca/cic/datasets/ids-2017.html
2. Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248–255 (2009). https://doi.org/10.1109/CVPR.2009.5206848
3. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016). https://doi.org/10.1109/CVPR.2016.90
4. Jia, Y., Zhong, F., Alrawais, A., Gong, B., Cheng, X.: FlowGuard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J. 7(10), 9552–9562 (2020). https://doi.org/10.1109/JIOT.2020.2993782
5. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2017)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating Drill-Down DDoS Destination Detection;2024 IEEE 49th Conference on Local Computer Networks (LCN);2024-10-08
2. 7D: Demonstrating Drill-Down DDoS Destination Detection;2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN);2024-05-05