News
In the experiments carried out, the flow-based features extracted out of network traffic data, including typical and different types of attacks, were used. The Receiver Operating Characteristics (ROC) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results