Login / Signup
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Bin Kong
Kun Yang
Degang Sun
Meimei Li
Zhixin Shi
Published in:
Comput. Sci. Inf. Syst. (2017)
Keyphrases
</>
data mining approaches
distributed denial of service
ddos attacks
data mining
cyber crime
data mining techniques
application scenarios
machine learning
rare events
identity theft
website
knowledge discovery
web mining
importance sampling
cyber security