Logo BSU

Please use this identifier to cite or link to this item: https://elib.bsu.by/handle/123456789/120105
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPlatonov, V. V.-
dc.contributor.authorSemenov, P. O.-
dc.date.accessioned2015-10-07T10:23:40Z-
dc.date.available2015-10-07T10:23:40Z-
dc.date.issued2014-
dc.identifier.citationNonlinear Phenomena in Complex Systems. - 2014. - Vol. 17, N 3. - P. 284-289ru
dc.identifier.issn1561 - 4085-
dc.identifier.urihttp://elib.bsu.by/handle/123456789/120105-
dc.description.abstractPossibility of application of dimension reduction techniques to generate a list of most significant parameters for detecting network attacks is analyzed. The model of intrusion detection system with modular architecture is proposed, which allows packages classification by different support vector machines.ru
dc.language.isoenru
dc.publisherMinsk : Education and Upbringingru
dc.rightsinfo:eu-repo/semantics/restrictedAccessen
dc.subjectЭБ БГУ::ТЕХНИЧЕСКИЕ И ПРИКЛАДНЫЕ НАУКИ. ОТРАСЛИ ЭКОНОМИКИ::Автоматика. Вычислительная техникаru
dc.titleDimension reduction in network attacks detection systemsru
dc.typearticleen
Appears in Collections:2014. Volume 17. Number 3

Files in This Item:
File Description SizeFormat 
v17no3p284.pdf166,84 kBAdobe PDFView/Open
Show simple item record Google Scholar



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.