Search

Your search keyword '"CIC-IDS-2017"' showing total 5 results

Search Constraints

Start Over You searched for: Descriptor "CIC-IDS-2017" Remove constraint Descriptor: "CIC-IDS-2017" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
5 results on '"CIC-IDS-2017"'

Search Results

1. Cybersecurity attacks: Which dataset should be used to evaluate an intrusion detection system?

2. Cybersecurity attacks: which dataset should be used to evaluate an intrusion detection system?

3. Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection.

4. Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection

5. Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System.

Catalog

Books, media, physical & digital resources