马笼头 发表于 2025-3-30 09:32:45

http://reply.papertrans.cn/32/3116/311547/311547_51.png

Tremor 发表于 2025-3-30 12:33:25

Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning,. We analyze IP flows in every cluster and assign an attack label to them. After the clusters are created, an incoming malicious IP flow is compared with all clusters and the label of the closest cluster is assigned to the IP flow. The intrusion detection system uses labeled flows to raise consolida

小隔间 发表于 2025-3-30 18:54:14

http://reply.papertrans.cn/32/3116/311547/311547_53.png

大方不好 发表于 2025-3-31 00:11:18

http://reply.papertrans.cn/32/3116/311547/311547_54.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Enterprise Security; Second International Victor Chang,Muthu Ramachandran,Gary Wills Conference proceedings 2017 Springer International Pub