2018
DOI: 10.1007/978-3-319-93408-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Out team is working on this research in the field of advanced monitoring of flows and in the evaluation of security events for networks and cloud computing systems. Several articles were published by our team on the topic of CC systems [38], their security architecture [39], the management of cybersecurity incidents and on creating a packet capture infrastructure for creating valuable datasets [40].…”
Section: Motivationmentioning
confidence: 99%
“…Out team is working on this research in the field of advanced monitoring of flows and in the evaluation of security events for networks and cloud computing systems. Several articles were published by our team on the topic of CC systems [38], their security architecture [39], the management of cybersecurity incidents and on creating a packet capture infrastructure for creating valuable datasets [40].…”
Section: Motivationmentioning
confidence: 99%
“…A stacking ensemble methodology was suggested in the study [14][15][16]. The ensemble technique involves LR, KNN, RF and SVM.…”
Section: Related Workmentioning
confidence: 99%
“…Our team is actively engaged in advanced flow monitoring and assessing security events for both networks and Cloud Computing systems. Numerous articles authored by our team delve into CC systems [4], their security architecture [5], the management of cybersecurity incidents, and the establishment of a packet capture infrastructure to generate valuable datasets [6,7].…”
mentioning
confidence: 99%