Search

Your search keyword '"NetFlow"' showing total 1,525 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow"
1,525 results on '"NetFlow"'

Search Results

1. Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges

2. A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection.

3. Tackling Evolving Botnet Threats: A Gradual Self-Training Neural Network Approach

4. NTFA: Network Flow Aggregator

5. Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data

6. Methods and High-performance Tools for Collecting, Analysis and Visualization of Data Exchange with a Focus on Research and Education Telecommunications Networks.

7. Network Traffic Classification Based On A Deep Learning Approach Using NetFlow Data.

8. An approach to application-layer DoS detection

9. A Quantitative Logarithmic Transformation-Based Intrusion Detection System

10. A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks

12. A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention

13. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks

14. Analysis of TCP flood attack using NetFlow

15. Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.

16. An approach to application-layer DoS detection.

17. ANALYSIS OF TCP FLOOD ATTACK USING NETFLOW.

18. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists

19. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems

20. Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification

21. Tensor-Based Online Network Anomaly Detection and Diagnosis

22. Privacy as a Service: Anonymisation of NetFlow Traces

23. Detection of illicit cryptomining using network metadata

24. A Machine Learning-based Real-time Monitoring System for Classification of Elephant Flows on KOREN.

25. SQL injection attack: Detection, prioritization & prevention.

26. The Impact of the Observation Period for Detecting P2P Botnets on the Real Traffic Using BotCluster

27. The Implementation of NetFlow Log System Using Ceph and ELK Stack

28. Sparse Autoencoders for Unsupervised Netflow Data Classification

29. Towards a Standard Feature Set for Network Intrusion Detection System Datasets.

30. Detection of illicit cryptomining using network metadata.

32. An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone

33. NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series

34. Netflow-Based Malware Detection and Data Visualisation System

35. SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification.

36. Host Behavior in Computer Network: One-Year Study.

37. Collection, Analysis and Interactive Visualization of NetFlow Data: Experience with Big Data on the Base of the National Research Computer Network of Russia.

38. Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic.

39. Security anomaly detection in software‐defined networking based on a prediction technique.

42. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

43. Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey

44. How to Effectively Collect and Process Network Data for Intrusion Detection?

45. Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic

46. How Dangerous Is Internet Scanning? : A Measurement Study of the Aftermath of an Internet-Wide Scan

47. Data Plane

49. UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats

50. Network anomaly detection using artificial neural networks

Catalog

Books, media, physical & digital resources