Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
Version 2 2024-06-05, 10:55Version 2 2024-06-05, 10:55
Version 1 2023-02-08, 04:53Version 1 2023-02-08, 04:53
conference contribution
posted on 2024-06-05, 10:55 authored by Siqi XiaSiqi Xia, Sutharshan RajasegararSutharshan Rajasegarar, C Leckie, SM Erfani, J ChanExploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
History
Volume
13787 LNCSPagination
105-119ISSN
0302-9743eISSN
1611-3349ISBN-13
9783031230196Publication classification
E1 Full written paper - refereedPublisher
Springer Nature SwitzerlandTitle of book
Network and System SecurityPublication URL
Usage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC