Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet flow
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 2:01pm
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
An efficient flow-based botnet detection using supervised machine learning
Submitted by BrandonB on Wed, 05/06/2015 - 10:20am
malicious botnet network traffic identification
Vegetation
Training
Traffic classification
Traffic analysis
telecommunication traffic
Support vector machines
supervised machine learning
Protocols
Peer-to-peer computing
packet flow
P2P botnets
nonmalicious applications
Accuracy
machine learning
learning (artificial intelligence)
invasive software
flow-based traffic analysis
flow-based botnet detection
feature extraction
computer network security
botnet neutralization
Botnet detection
botnet
Bayes methods
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:05am
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks