-
1
-
-
85006937630
-
-
Scapy official documentation
-
Scapy official documentation, "http://www.secdev.org/projects/scapy/"
-
-
-
-
2
-
-
85006939179
-
-
Python 2.7 official documentation
-
Python 2.7 official documentation, "https://www.python.org/"
-
-
-
-
3
-
-
85006926493
-
-
Haka official documentation
-
Haka official documentation, "http://www.haka-security.org/"
-
-
-
-
4
-
-
85006837748
-
-
Cybrary Academy -Malware detection techniques course
-
Cybrary Academy -Malware detection techniques course, "https://www.cybrary.it/course/malware-analysis/"
-
-
-
-
5
-
-
85006939164
-
-
The third international knowledge discovery and data mining tools competition dataset KDD99-Cup
-
The third international knowledge discovery and data mining tools competition dataset KDD99-Cup,"http://kdd.ics.uc i.edu/databases/kddcup99/kddcup99.html", 1999.
-
(1999)
-
-
-
6
-
-
84942124336
-
Analysis of kdd cup 99 dataset using clustering based data mining
-
Mohammad Khubeb Siddiqui and Shams Naahid, "Analysis of kdd cup 99 dataset using clustering based data mining", International Journal of Database Theory and Application", Vol.6, No.5 (2013), pp.23-34
-
(2013)
International Journal of Database Theory and Application
, vol.6
, Issue.5
, pp. 23-34
-
-
Siddiqui, M.K.1
Naahid, S.2
-
7
-
-
85006884573
-
Detection of probe attacks using machine learning techniques
-
March
-
Ch.Ambedkar & V. Kishore Babu ,"Detection of probe attacks using machine learning techniques", International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 3, March 2015, PP 25-29
-
(2015)
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE)
, vol.2
, Issue.3
, pp. 25-29
-
-
Ambedkar, Ch.1
Kishore Babu, V.2
-
8
-
-
85006866515
-
Network intrusion detection using random forests
-
Jiong Zhang and Mohammad Zulkernine, "Network intrusion detection using random forests", IEEE Transactions on Systems, Man, and Cybernetics, Volume: 38, 2008
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.38
-
-
Zhang, J.1
Zulkernine, M.2
-
10
-
-
85008947904
-
Analyze different approaches for ids using kdd 99 data set
-
ISSN 2321 -8169
-
Mr. Kamlesh Lahre, Mr. Tarun Dhar, Diwan Suresh,Kumar Kashyap, Pooja Agrawal , "Analyze different approaches for IDS using KDD 99 data set", International Journal on Recent and Innovation Trends in Computing and Communication, ISSN 2321 -8169, Volume: 1 Issue: 8 645-651, 2013
-
(2013)
International Journal on Recent and Innovation Trends in Computing and Communication
, vol.1
, Issue.8
, pp. 645-651
-
-
Lahre, K.1
Dhar, T.2
Suresh, D.3
Kashyap, K.4
Agrawal, P.5
-
11
-
-
85006938697
-
Attacks & defense mechanisms for TCP/IP based protocols
-
ISSN: 2277 -5668
-
Alok Pandey & Dr. Jatinderkumar & R. Saini, "Attacks & defense mechanisms for TCP/IP based protocols", International Journal of Engineering Innovation & Research, Volume 3, Issue 1, ISSN: 2277 -5668, 2014
-
(2014)
International Journal of Engineering Innovation & Research
, vol.3
, Issue.1
-
-
Pandey, A.1
Kumar, J.2
Saini, R.3
-
14
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
Christopher Kruegel, Giovanni Vigna, William Robertson, "A multi-model approach to the detection of web-based attacks", "Computer Networks", vol, 48, nr.5, pag. 717-738, 2005
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
15
-
-
1242321281
-
Ddos attacks and defense mechanisms: Classification and state-of-The-art
-
5 April
-
Christos Douligeris, Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-The-art", Computer Networks Volume 44, Issue 5, 5 April 2004, Pages 643-666
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
16
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection
-
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee, "BotMiner: clustering analysis of network traffic for protocol and structure independent botnet detection", Proceedings of the 17th conference on Security symposium, pag. 139-154, 2008
-
(2008)
Proceedings of the 17th conference on Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
18
-
-
84861508446
-
Analysis of kdd '99 intrusion detection dataset for selection of relevance features
-
WCECS 2010, October 20-22, 2010, San Francisco, USA
-
Adetunmbi A.Olusola., Adeola S.Oladele and Daramola O.Abosede, "Analysis of KDD '99 intrusion detection dataset for selection of relevance features", Proceedings of the World Congress on Engineering and Computer Science, 2010 Vol I WCECS 2010, October 20-22, 2010, San Francisco, USA
-
(2010)
Proceedings of the World Congress on Engineering and Computer Science
, vol.1
-
-
Olusola, A.A.1
Oladele, A.S.2
Abosede, D.O.3
-
19
-
-
33646371466
-
Online passive-aggressive algorithms
-
Koby Crammer ,Ofer Dekel,Joseph Keshet, Shai Shalev-Shwartz, Yoram Singer,"Online passive-aggressive algorithms", Journal of Machine Learning Research 7 (2006) 551-585, 2006
-
(2006)
Journal of Machine Learning Research
, vol.7
, Issue.2006
, pp. 551-585
-
-
Crammer, K.1
Dekel, O.2
Keshet, J.3
Shalev-Shwartz, S.4
Singer, Y.5
-
20
-
-
84885205587
-
Snort flow: An open flow-based intrusion prevention system in cloud environment
-
Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar, "Snort Flow: an open flow-based intrusion prevention system in cloud environment", Second GENI Research and Educational Experiment Workshop, 2013
-
(2013)
Second GENI Research and Educational Experiment Workshop
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.-J.4
Khatkar, P.5
-
21
-
-
85006870889
-
-
RFC793
-
RFC793: https://tools.ietf.org/html/rfc793
-
-
-
-
22
-
-
85006869417
-
-
Scikit-Learn -Machine learning in python
-
Scikit-Learn -Machine learning in python: http://scikit-learn.org/
-
-
-
|