Detecting cybersecurity attacks across different network features and learners.
Joffrey L. LeevyJohn T. HancockRichard ZuechTaghi M. KhoshgoftaarPublished in: J. Big Data (2021)
Keyphrases
- traffic analysis
- e learning
- feature vectors
- peer to peer
- computer networks
- low level
- learning experience
- network traffic
- detecting malicious
- network intrusion
- security threats
- input patterns
- network topologies
- network model
- learning activities
- collaborative learning
- wireless sensor networks
- feature space
- learning environment
- feature extraction