Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference38 articles.
1. Zhang, Y., Zhao, D., Liu, J.: The application of Baum-welch algorithm in multistep attack. Sci. World J. (2014). https://doi.org/10.1155/2014/374260
2. Almseidin, M., Piller, I., Al-Kasassbeh, M., Kovacs, S.: Fuzzy automaton as a detection mechanism for the multi-step attack. Int. J. Adv. Sci. Eng. Inf. Technol. 9(2), 575 (2019)
3. Almseidin, M., Alzubi, M., Kovacs, S., Alkasassbeh, M.: Evaluation of machine learning algorithms for intrusion detection system. In: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium on, pp. 000277–000282. IEEE, (2017)
4. Alkasassbeh, M., Almseidin, M.: Machine learning methods for network intrusion detection. ICCCNT 2018—The 20th International Conference On Computing, Communication And Networking Technologies, (2018)
5. Kaspersky DDoS Report kernel description. https://securelist.com/category/ddos-reports/ (2021). Accessed 10 Nov 2021
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献