Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference31 articles.
1. Netscout (2019) With key findings from the 15th annual worldwide infrastructure security report (wisr). https://www.netscout.com/threatreport
2. Liu J-C, Yang C-T, Chan Y-W, Kristiani E, Jiang W-J (2021) Cyberattack detection model using deep learning in a network log system with data visualization. J Supercomput 77(10):10984–11003
3. Yang C-T, Chan Y-W, Liu J-C, Kristiani E, Lai C-H (2022) Cyberattacks detection and analysis in a network log system using xgboost with elk stack, Soft Comput 1–15
4. Bajaber F, Sakr S, Batarfi O, Altalhi A, Barnawi A (2020) Benchmarking big data systems: a survey. Comput Commun 149:241–251
5. Huang S (2012) Performance analysis of cluster databases base on ycsb system
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献