Search

Your search keyword '"NetFlow"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
35 results on '"NetFlow"'

Search Results

1. Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges

2. A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection.

3. Tackling Evolving Botnet Threats: A Gradual Self-Training Neural Network Approach

4. NTFA: Network Flow Aggregator

5. Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data

6. Methods and High-performance Tools for Collecting, Analysis and Visualization of Data Exchange with a Focus on Research and Education Telecommunications Networks.

7. Network Traffic Classification Based On A Deep Learning Approach Using NetFlow Data.

8. An approach to application-layer DoS detection

9. A Quantitative Logarithmic Transformation-Based Intrusion Detection System

10. A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks

12. A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention

13. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks

14. Analysis of TCP flood attack using NetFlow

15. Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.

16. An approach to application-layer DoS detection.

17. ANALYSIS OF TCP FLOOD ATTACK USING NETFLOW.

18. Tensor-Based Online Network Anomaly Detection and Diagnosis

19. Detection of illicit cryptomining using network metadata

20. A Machine Learning-based Real-time Monitoring System for Classification of Elephant Flows on KOREN.

21. SQL injection attack: Detection, prioritization & prevention.

22. Towards a Standard Feature Set for Network Intrusion Detection System Datasets.

23. Detection of illicit cryptomining using network metadata.

24. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

25. Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey

26. Efficient and Accurate Flow Record Collection With HashFlow

27. SQL injection attack detection in network flow data

28. Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR’16

29. Detection of illicit cryptomining using network metadata

30. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

31. Detecting DNS hijacking by using NetFlow data

32. Detecting DNS hijacking by using NetFlow data

33. Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection

34. Anomaly detection in NetFlow network traffic using supervised machine learning algorithms

35. A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention

Catalog

Books, media, physical & digital resources