메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Online detection of anomalous network flows with soft clustering

Author keywords

Accuracy; Clustering algorithms; Feature extraction; Histograms; Intrusion detection; IP networks; Training

Indexed keywords

BEHAVIORAL RESEARCH; CLUSTERING ALGORITHMS; FEATURE EXTRACTION; MERCURY (METAL); PERSONNEL TRAINING;

EID: 84960917628     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2015.7266510     Document Type: Conference Paper
Times cited : (3)

References (23)
  • 19
    • 0032269108 scopus 로고    scopus 로고
    • How many clusters? Which clustering method? Answers via model-based cluster analysi
    • C. Fraley and A. Raftery, "How many clusters? which clustering method? answers via model-based cluster analysi," The Computer Journal, vol. 41, pp. 578-588, 1998.
    • (1998) The Computer Journal , vol.41 , pp. 578-588
    • Fraley, C.1    Raftery, A.2
  • 21
    • 84960888311 scopus 로고    scopus 로고
    • Jyvsectec-rgce-homepage
    • "Jyvsectec-rgce-homepage," http://www.jyvsectec.fi/en/rgce/.
  • 23
    • 84960886801 scopus 로고    scopus 로고
    • Ministry of defence press release 8.5.2013, kyberturvallisuusharjoitus jyväskylässä 13.-17.5.2013
    • "Ministry of defence press release 8.5.2013, kyberturvallisuusharjoitus jyväskylässä 13.-17.5.2013," http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus jyvaskylassa 13.-17.5.2013.5502.news, 2013.
    • (2013)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.