[PDF][PDF] Predicting DOS-DDOS attacks: Review and evaluation study of feature selection methods based on wrapper process
K Bouzoubaa, Y Taher, B Nsiri - Int. J. Adv. Comput. Sci. Appl, 2021 - academia.edu
Now-a-days, Cybersecurity attacks are becoming increasingly sophisticated and presenting
a growing threat to individuals, private and public sectors, especially the Denial Of Service …
a growing threat to individuals, private and public sectors, especially the Denial Of Service …
A multi-layer perceptron approach for flow-based anomaly detection
L Van Efferen, AMT Ali-Eldin - 2017 international symposium …, 2017 - ieeexplore.ieee.org
The increase in successful cyber-attacks on systems with firewalls and encryption
techniques has led to the creation of Intrusion Detection Systems (IDS). Machine learning …
techniques has led to the creation of Intrusion Detection Systems (IDS). Machine learning …
A new satellite-ship autonomous communication system with an integrated deep learning anomaly detection algorithm
D Wu, S Liu, W Wei, Y Sui - Multimedia Tools and Applications, 2024 - Springer
To realize space-sea integrated communication between multiple ships under the BeiDou-3
satellite communication topology, this paper proposes a new satellite-ship autonomous …
satellite communication topology, this paper proposes a new satellite-ship autonomous …
Author Matching Classification with Anomaly Detection Approach for Bibliomethric Repository Data.
Authors name disambiguation (AND) is a complex problem in the process of identifying an
author in a digital library (DL). The AND data classification process is very much determined …
author in a digital library (DL). The AND data classification process is very much determined …
[PDF][PDF] Opleiding Informatica
N Bohrweg - 2016 - liacs.leidenuniv.nl
Our surroundings are becoming increasingly driven by programs aimed at automating real-
world tasks; self-driving cars, crop survey robots and supply chain drones are but modest …
world tasks; self-driving cars, crop survey robots and supply chain drones are but modest …