Sign in

Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset.

Sikha BaguiEzhil KalaimannanSubhash C. BaguiDebarghya NandiAnthony Pinto
Published in: Secur. Priv. (2019)
Keyphrases
  • cyber attacks
  • cyber security
  • decision trees
  • decision support system
  • security policies
  • countermeasures
  • real time
  • intrusion detection
  • third party
  • critical infrastructure