Have a personal or library account? Click to login
Analysis and Collection Data from IP Network Cover
Open Access
|Oct 2022

References

  1. [1] PAPADAKI, M. – FURNELL, S.: “IDS or IPS: What Is Best?” Network Security, grade. 2004: doi.org, 7 7, No. 2004 (15–19) https://doi.org/10.1016/S1353-4858(04)00106-0
  2. [2] GHAFAR A. JAAFAR et al. “Review of Recent Detection Methods for HTTP DDoS Attack”. Journal of Computer Networks and Communications, grade. 2019: doi.org, 18 1, No. 2019 (1–10) https://doi.org/10.1155/2019/1283472
  3. [3] GALINEC, D. et al. “Cybersecurity and Cyber De-fence: National Level Strategic Approach”. Automatika, grade. 58,č. 3 (Crossref).: doi.org, 18 7, No. 2017 (273–286) https://doi.org/10.1080/00051144.2017.1407022
  4. [4] VON SOLMS, R. – VAN NIEKERK, J.: “From Information Security to Cyber Security”. Computers Security, grade. 38:, 18 10, No. 2013 (97–102) https://doi.org/10.1016/j.cose.2013.04.004
  5. [5] KILINCER, I.F. et al. “Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study”. Computer Networks, grade. 188:, 18 4, No. 2021 (107840) https://doi.org/10.1016/j.comnet.2021.107840
  6. [6] AOUINI, Z.– PEKAR, A.: “NFStream”. Computer Networks, grade. 204:, 18 2, No. 2022 (108719) https://doi.org/10.1016/j.comnet.2021.108719
  7. [7] PEKÁR, A. et al. “Adaptive Aggregation of Flow Records”. Computing and Informatics, grade. 37:, 1 1, No. 2018 (142–164) https://doi.org/10.4149/cai_2018_1_142
  8. [8] GUAN, H. et al. “Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling”. IEEE Transactions on Parallel and Distributed Systems, grade. 24:, 6 6, No. 2013 (1118–11128) https://doi.org/10.1109/TPDS.2012.339
  9. [9] GYORöDI, C. et al. “A Comparative Study of Relational and Non-Relational Database Models in a Web- Based Application”. International Journal of Advanced Computer Science and Applications, grade. 6:, 18 11, No. 2015 (78–83) https://doi.org/10.14569/IJACSA.2015.061111
  10. [10] VAJDA, D. et al. “Towards Machine Learning-based Anomaly Detection on Time-Series Data”. Infocommunications journal, grade. 13:, 18 1, No. 2021 (35–44) https://doi.org/10.36244/ICJ.2021.1.5
DOI: https://doi.org/10.2478/aei-2022-0013 | Journal eISSN: 1338-3957 | Journal ISSN: 1335-8243
Language: English
Page range: 18 - 23
Submitted on: Apr 29, 2022
Accepted on: Aug 20, 2022
Published on: Oct 14, 2022
Published by: Technical University of Košice
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Martin Hasin, Martin Chovanec, Jakub Palša, Martin Havrilla, published by Technical University of Košice
This work is licensed under the Creative Commons Attribution 4.0 License.