Author:
Linhares Tiago,Patel Ahmed,Barros Ana Luiza,Fernandez Marcial
Funder
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference54 articles.
1. Andreas, B., Dilruksha, J., McCandless, E.: Flow-based and packet-based intrusion detection using BLSTM. SMU Data Sci. Rev. 3(3), 8 (2020)
2. Azab, A., Khasawneh, M., Alrabaee, S., et al.: Network traffic classification: techniques, datasets, and challenges. Digit. Commun. Netw. (2022). https://doi.org/10.1016/j.dcan.2022.09.009
3. Barbosa, R.R.R., Sadre, R., Pras, A., et al:. Simpleweb. University of Twente Traffic Traces Data Repository (2010)
4. Barron, A.R.: Entropy and the central limit theorem. Ann. Probab. 14(1), 336–342 (1986)
5. Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: IEEE 35th Conference on Local Computer Networks (LCN2010), 2010, pp 408–415. IEEE (2010)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献