Search

Your search keyword '"CIC-IDS-2017"' showing total 5 results

Search Constraints

Start Over You searched for: Descriptor "CIC-IDS-2017" Remove constraint Descriptor: "CIC-IDS-2017" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
5 results on '"CIC-IDS-2017"'

Search Results

1. Cybersecurity attacks: Which dataset should be used to evaluate an intrusion detection system?

2. Cybersecurity attacks: which dataset should be used to evaluate an intrusion detection system?

3. Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection.

4. Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection

5. Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System.

Catalog

Books, media, physical & digital resources