马笼头
发表于 2025-3-30 09:32:45
http://reply.papertrans.cn/32/3116/311547/311547_51.png
Tremor
发表于 2025-3-30 12:33:25
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning,. We analyze IP flows in every cluster and assign an attack label to them. After the clusters are created, an incoming malicious IP flow is compared with all clusters and the label of the closest cluster is assigned to the IP flow. The intrusion detection system uses labeled flows to raise consolida
小隔间
发表于 2025-3-30 18:54:14
http://reply.papertrans.cn/32/3116/311547/311547_53.png
大方不好
发表于 2025-3-31 00:11:18
http://reply.papertrans.cn/32/3116/311547/311547_54.png