Privacy Preserving Machine Learning in Various Attacks on Security Threat Models (original) (raw)

Review Over Anomaly Detection Algorithms for Detecting SYN Flooding Attacks

ahmad iqbal

2005 Student Conference on Engineering Sciences and Technology, 2005

View PDFchevron_right

Review of syn-flooding attack detection mechanism

Dr. Angela Amphawan, Mehdi Manaa

International Journal of Distributed and Parallel Systems (IJDPS), Vol.3, No.1,pp. 99-117, 2012

View PDFchevron_right

Intrusion Detection: A Survey

vipin Kumar

Computer Science Department, University of …, 2005

View PDFchevron_right

Application of anomaly detection algorithms for detecting SYN flooding attacks

Zeeshan Qaiser

Computer Communications, 2006

View PDFchevron_right

Validation Methods of Suspicious Network Flows for Unknown Attack Detection

Yangseo Choi

2009

View PDFchevron_right

A Comprehensive Study ofIntelligent Techniques for Detecting Network Attacks

International Journal of Recent Research Aspects ISSN 2349-7688

View PDFchevron_right

Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic

Muhammad Saqib

International Journal of Computer Science Issues, 2012

View PDFchevron_right

Adaptive Cyber Security: Machine Learning Techniques for a Flow-Based Anomaly Intrusion Detection System

Lennart Van Efferen

2017

View PDFchevron_right

A Literature Survey and Comprehensive Study of Intrusion

Dr Ravi Prakash Reddy

View PDFchevron_right

Automatic network intrusion detection: Current techniques and open issues

Carlos Garcia Garino

Computers & Electrical Engineering, 2012

View PDFchevron_right

Analysis, Design, and Comparison of Machine-Learning Techniques for Networking Intrusion Detection

PIERPAOLO DINI

2021

View PDFchevron_right

Extension of Behavioral Analysis of Network Traffic Focusing on Attack Detection

kali linux

2015

View PDFchevron_right

Detecting network intrusions via a statistical analysis of network packet characteristics

Shawn Ostermann

2002

View PDFchevron_right

A Model to Detect Network Intrusion Using Machine Learning

Ledum Atu

2021

View PDFchevron_right

A Comprehensive Model for Revealing Anomaly in Network Data Flow

Maher Salem

2014

View PDFchevron_right

Analysis of Various Machine Learning Approach to Detect Anomaly from Network Traffic

Dr. Tryambak A Hiwarkar

International journal of computer science and mobile computing, 2022

View PDFchevron_right

UNIVERSITY OF HERTFORDSHIRE Faculty of Engineering and Information Sciences Network Traffic Anomaly Detection: Using Neural Nets to Identify Attack Patterns on a Network Host

Dr Mario Mallia-Milanes

View PDFchevron_right

Applications of Neural Networks in Network Intrusion Detection

JELENA NIKOLIC

2006 8th Seminar on Neural Network Applications in Electrical Engineering, 2006

View PDFchevron_right

Special Issue on Network Security Techniques (DOI: 10.13140/RG.2.1.2079.1125)

Amany Sarhan, Alaa Sheta, Dr. Ashraf M M Aboshosha

View PDFchevron_right

Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and Intrusion Prevention for Enhanced User Privacy

AJAST Journal

Asian Journal of Applied Science and Technology (AJAST), 2018

View PDFchevron_right

Hybrid Learning Method to Detect the Malicious Transactions in Network Data Hybrid Learning Method to Detect the Malicious Transactions in Network Data

Dr.N. RAGHAVENDRA SAI

View PDFchevron_right

IJERT-Artificial Intelligence Techniques for Network Intrusion Detection

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2016

View PDFchevron_right

Detection of Anomalies in the Computer Network Behaviour

Danijela Protic

European Journal of Engineering and Formal Sciences, 2020

View PDFchevron_right

Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic

Waqas Tariq

View PDFchevron_right

Intrusion Detection System for SYN Flood Attack: Methods and Implementation

Journal of Computer Science IJCSIS

View PDFchevron_right

Design Machine Learning BasedIntelligent Techniques for Detecting Network Attacks

International Journal of Recent Research Aspects ISSN 2349-7688

View PDFchevron_right

Survey on Classification, Detection and Prevention of Network Attacks using Rule based Approach

Dr. Arvind Bhagat Patil

International Journal of Computer Applications, 2017

View PDFchevron_right

Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

Georg Carle

Computer Science - Research and Development, 2009

View PDFchevron_right

TRAFFIC ANALYSIS BAS ED IDENTIFICATION OF ATTACKS

Dima Novikov, Roman Yampolskiy

International Journal of …, 2008

View PDFchevron_right

Machine Learning for the Identification of Network Anomalies

Mayur Sonawane

Indian Scientific Journal Of Research In Engineering And Management, 2023

View PDFchevron_right

8. 08102 Manifesto – Perspectives Workshop: Network Attack Detection and Defense

Georg Carle

2008

View PDFchevron_right