2020
DOI: 10.1007/978-3-030-57805-3_40
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Mapping of Detection Techniques for Advanced Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…So, after our analysis, KNN was the best classifier. KNN is also one of the most used algorithms in the literature to detect malicious traffic, as shown in [ 6 ]. In [ 6 ], the authors established that decision trees and NB are commonly used to detect malicious traffic.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…So, after our analysis, KNN was the best classifier. KNN is also one of the most used algorithms in the literature to detect malicious traffic, as shown in [ 6 ]. In [ 6 ], the authors established that decision trees and NB are commonly used to detect malicious traffic.…”
Section: Discussionmentioning
confidence: 99%
“…KNN is also one of the most used algorithms in the literature to detect malicious traffic, as shown in [ 6 ]. In [ 6 ], the authors established that decision trees and NB are commonly used to detect malicious traffic. In our research, decision trees also presented good performance with accuracy, , , and scores higher than 0.9.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations