Author:
Phulre Ajay Kumar,Verma Manoj,Mathur Jitendra Pratap Singh,Jain Sanat
Publisher
Springer Nature Singapore
Reference22 articles.
1. Thanh H, Ngoc, Lang TV (2019) An approach to reduce data dimension in building effective network intrusion detection systems. EAI Endorsed Trans Context-Aware Syst Appl 6:1–11
2. Han LI (2011) Using a dynamic K-means algorithm to detect anomaly activities. In: 2011 seventh international conference on computational intelligence and security, pp 1049–1052
3. Sharafaldin I (2018) Intrusion detection evaluation dataset (CICIDS2017). Canadian Institute for Cybersecurity, Jan 2018. Accessed on 12 May 2020 [online]. Available https://www.unb.ca/cic/datasets/ids-2017.html
4. Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: The proceedings of the 3rd international conference on information system security and privacy, SCITEPRESS, Porto, Portugal
5. Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and VPN traffic using time-related features. In: The proceedings of the 2nd international conference on information systems security and privacy (ICISSP 2016), Italy, pp 407–414
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating Security enhancement through Machine Learning Approaches for Anomaly Based Intrusion Detection Systems;2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS);2024-02-24