Data Mining-Based Malicious Traffic Classification Algorithm for Campus Networks

被引:0
|
作者
Wu, Ziai [1 ,2 ,3 ]
机构
[1] Chizhou University, Anhui, Chizhou,247000, China
[2] Philippine Christian University Center for International Education, Manila, 1006, Philippines
[3] Philippine Office of College of Business, Chizhou University, Education Park, Anhui, Chizhou,247000, China
关键词
Compendex;
D O I
10.6633/IJNS.202305_25(3).06
中图分类号
学科分类号
摘要
Data mining
引用
收藏
页码:431 / 435
相关论文
共 50 条
  • [1] Data mining-based algorithm for assortment planning
    Srivastava, Praveen Ranjan
    Sharma, Satyendra
    Kaur, Simran
    JOURNAL OF MANAGEMENT ANALYTICS, 2020, 7 (03) : 443 - 457
  • [2] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [3] Process mining-based approach for investigating malicious login events
    Lagraa, Sofiane
    State, Radu
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [4] An Intelligent Data Mining-Based Fault Detection and Classification Strategy for Microgrid
    Baloch, Shazia
    Muhammad, Mannan Saeed
    IEEE ACCESS, 2021, 9 : 22470 - 22479
  • [5] Data mining-based integrated network traffic visualization framework for threat detection
    Bhardwaj, Amit Kumar
    Singh, Maninder
    NEURAL COMPUTING & APPLICATIONS, 2015, 26 (01): : 117 - 130
  • [6] Data mining-based integrated network traffic visualization framework for threat detection
    Amit Kumar Bhardwaj
    Maninder Singh
    Neural Computing and Applications, 2015, 26 : 117 - 130
  • [7] Data mining-based algorithm for storage location assignment in a randomised warehouse
    Pang, King-Wah
    Chan, Hau-Ling
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2017, 55 (14) : 4035 - 4052
  • [8] An outlier mining-based malicious node detection model for hybrid P2P networks
    Meng, Xianfu
    Ren, Shuang
    COMPUTER NETWORKS, 2016, 108 : 29 - 39
  • [9] Data mining-based intrusion detectors
    Wu, Su-Yun
    Yen, Ester
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 5605 - 5612
  • [10] Glycoinformatics: Data Mining-based Approaches
    Mamitsuka, Hiroshi
    CHIMIA, 2011, 65 (1-2) : 10 - 13