Search

Your search keyword '"NetFlow"' showing total 1,000 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow" Search Limiters Full Text Remove constraint Search Limiters: Full Text
1,000 results on '"NetFlow"'

Search Results

1. Tackling Evolving Botnet Threats: A Gradual Self-Training Neural Network Approach

2. An approach to application-layer DoS detection

3. A Quantitative Logarithmic Transformation-Based Intrusion Detection System

4. Analysis of TCP flood attack using NetFlow

5. An approach to application-layer DoS detection.

6. ANALYSIS OF TCP FLOOD ATTACK USING NETFLOW.

7. Tensor-Based Online Network Anomaly Detection and Diagnosis

8. Detection of illicit cryptomining using network metadata

9. A Machine Learning-based Real-time Monitoring System for Classification of Elephant Flows on KOREN.

10. Detection of illicit cryptomining using network metadata.

11. An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone

12. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

13. How to Effectively Collect and Process Network Data for Intrusion Detection?

14. UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats

15. Network anomaly detection using artificial neural networks

16. Efficient and Accurate Flow Record Collection With HashFlow

17. Utilising Flow Aggregation to Classify Benign Imitating Attacks

18. COLETA, TRATAMENTO E ARMAZENAMENTO DE FLUXOS NO PADRÃO NETFLOW

19. SQL injection attack detection in network flow data

20. Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR’16

21. Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models

22. Detection of illicit cryptomining using network metadata

23. Anonymization of Network Traces Data through Condensation-based Differential Privacy

24. SEGURANÇA EM REDES DE COMPUTADORES USANDO SISTEMAS DE DETECÇÃO DE INTRUSÃO BASEADOS EM FLUXOS

25. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

26. Detecting DNS hijacking by using NetFlow data

27. Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach.

28. Automated detection-in-depth in industrial control systems

29. Detecting DNS hijacking by using NetFlow data

30. Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection

31. A Large Scale NetFlow Analysis System Based on Spark

32. Detecting impersonation attacks in cloud computing environments using a centric user profiling approach

33. Anomaly detection in NetFlow network traffic using supervised machine learning algorithms

34. Cyberattack detection model using deep learning in a network log system with data visualization

35. Host Behavior in Computer Network: One-Year Study

36. Self-supervised network traffic management for DDoS mitigation within the ISP domain

37. Refined Detection of SSH Brute-Force Attackers Using Machine Learning

38. Hybrid Botnet Detection Based on Host and Network Analysis

39. NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph

40. Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in Networks

41. A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention

42. Fast application-level traffic classification using NetFlow records

43. Using NetFlow to measure the impact of deploying DNS-based blacklists

44. How to Effectively Collect and Process Network Data for Intrusion Detection?

45. Research and implement on segmenting storage model of netflow

46. COLETA, TRATAMENTO E ARMAZENAMENTO DE FLUXOS NO PADRÃO NETFLOW.

47. A personalized approach for communicating found anomalies in Netflow data to end-users

48. Research of Typical Information Objects Traffic

49. On construction of a network log management system using ELK Stack with Ceph

50. Understanding flows in high-speed scientific networks: A Netflow data study

Catalog

Books, media, physical & digital resources