摘要: … Third, from the consensus clusters we have obtained, we can discover a posteriori M5 and decision tree-based rules explaining attack clusters’ characteristics that we will further enable …
José Jair Santanna, Roland van Rijswijk-Deij, Anna Sperotto, Rick Hofstede, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras, José Jair Santanna, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Booters — An analysis of DDoS-as-a-service attacksintegrated network management. pp. 243- 251 ,(2015) , 10.1109/INM.2015.7140298