Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Journal of Internet Computing and Services, Vol. 19, No. 1, pp. 1-10, Feb. 2018
10.7472/jksii.2018.19.1.1, Full Text:
Keywords: LDA, network threat detection, Intrusion Detection System, signature
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Lee, S., Lee, S., Lee, J., & Youm, H. (2018). Extraction of Network Threat Signatures Using Latent Dirichlet Allocation. Journal of Internet Computing and Services, 19(1), 1-10. DOI: 10.7472/jksii.2018.19.1.1.
[IEEE Style]
S. Lee, S. Lee, J. Lee, H. Youm, "Extraction of Network Threat Signatures Using Latent Dirichlet Allocation," Journal of Internet Computing and Services, vol. 19, no. 1, pp. 1-10, 2018. DOI: 10.7472/jksii.2018.19.1.1.
[ACM Style]
Sungil Lee, Suchul Lee, Jun-Rak Lee, and Heung-youl Youm. 2018. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation. Journal of Internet Computing and Services, 19, 1, (2018), 1-10. DOI: 10.7472/jksii.2018.19.1.1.