4/5/2023 0 Comments Anormaly detection ddos![]() ![]() In: 18th International Conference on Pattern Recognition, 2006. Martinez-Arroyo, M., Sucar, L.E.: Learning an optimal naive bayes classifier. In: 2013 International Conference on IEEE Cloud & Ubiquitous Computing & Emerging Technologies (CUBE) pp. ![]() Tesfahun, A., Bhaskari, D.L.: Intrusion detection using random forests classifier with SMOTE and feature reduction. IEEE (2014)Ībid, K.: An efficient intrusion detection using J48 decision tree in KDDCUP99 dataset. In: 2014 Conference on IT in Business, Industry and Government (CSIBIG), pp. Prajapati, N.M., Mishra, A., Bhanodia, P.: Literature survey-IDS for DDoS attacks. Patcha, A, Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Tang, H., Cao, Z.: Machine Learning-based intrusion detection algorithms. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |