Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity
暂无分享,去创建一个
Francisco Cervantes | Alvaro Parres-Peredo | Ivan Piza-Davila | I. Piza-Dávila | A. Parres-Peredo | Francisco Cervantes
[1] Kuai Xu,et al. Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections , 2014, IEEE/ACM Trans. Netw..
[2] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[3] Tao Qin,et al. MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring , 2015, IEEE Systems Journal.
[4] Alistair Moffat,et al. A similarity measure for indefinite rankings , 2010, TOIS.
[5] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[6] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..