Author:
Shin Seongjun,Lee Seungmin,Kim Hyunwoo,Kim Sehun
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference17 articles.
1. The use of the area under the ROC curve in the evaluation of machine learning algorithms;Bradley;Pattern Recognition,1997
2. Stochastic processes;Doob,1953
3. Enhancing the accuracy of network-based intrusion detection with host-based context;Dreger;Lecture Notes in Computer Science,2005
4. A clustering-based method for unsupervised intrusion detections;Jiang;Pattern Recognitions Letter,2006
5. Ju, W. H., & Vardi, Y. (1999). A hybrid high-order markov chain model for computer intrusion detection. National Institute of Statistical Sciences. Technical report no. 92.
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Predicting Cyber-Attacks and Identifying Perpetrators Using Machine Learning Techniques;2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN);2024-07-18
2. A new unsupervised outlier detection method;Journal of Intelligent & Fuzzy Systems;2024-01-10
3. DDoS Detection and Prediction Techniques-A Survey;2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES);2023-04-28
4. Distributed denial of service attack prediction: Challenges, open issues and opportunities;Computer Networks;2023-02
5. Systematic Literature Review of Security Event Correlation Methods;IEEE Access;2022