Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Journal of Internet Computing and Services, Vol. 19, No. 1, pp. 1-10, Feb. 2018
Keywords: LDA, network threat detection, Intrusion Detection System, signature
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Lee, S., Lee, S., Lee, J., & Youm, H. (2018). Extraction of Network Threat Signatures Using Latent Dirichlet Allocation. Journal of Internet Computing and Services, 19(1), 1-10. DOI: 10.7472/jksii.2018.19.1.1.
[IEEE Style]
S. Lee, S. Lee, J. Lee, H. Youm, "Extraction of Network Threat Signatures Using Latent Dirichlet Allocation," Journal of Internet Computing and Services, vol. 19, no. 1, pp. 1-10, 2018. DOI: 10.7472/jksii.2018.19.1.1.
[ACM Style]
Sungil Lee, Suchul Lee, Jun-Rak Lee, and Heung-youl Youm. 2018. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation. Journal of Internet Computing and Services, 19, 1, (2018), 1-10. DOI: 10.7472/jksii.2018.19.1.1.

