2017
DOI: 10.1007/978-3-319-64701-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Big Data Analysis Algorithms for Network Security Measurement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…As what we have discussed in [34] and [35], normally, a big data problem can be solved by following the steps listed in Fig. 2.…”
Section: Big Data Analysis and Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…As what we have discussed in [34] and [35], normally, a big data problem can be solved by following the steps listed in Fig. 2.…”
Section: Big Data Analysis and Processingmentioning
confidence: 99%
“…For further knowledge about big data analysis, we suggest the readers for the survey works of [34] and [40].…”
Section: Fig 2 General Data Analysis Procedures For Big Datamentioning
confidence: 99%
“…PCA. Principal Component Analysis (PCA) is a multivariate statistical technique used for feature reduction [12,52]. The goal of PCA in intrusion detection is to extract n (small integer) most important features representing the dataset.…”
Section: Feature Fusionmentioning
confidence: 99%