Network based intrusion detection using the UNSW-NB15 dataset

S Meftah, T Rachidi, N Assem - International Journal of …, 2019 - journal.uob.edu.bh
In this work, we apply a two stage anomaly-based network intrusion detection process using
the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests …

Network Based Intrusion Detection Using the UNSW-NB15 Dataset

S Meftah, T Rachidi, N Assem - International Journal of …, 2019 - journals.uob.edu.bh
In this work, we apply a two stage anomaly-based network intrusion detection process using
the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests …

[PDF][PDF] Network Based Intrusion Detection Using the UNSW-NB15 Dataset

S Meftah, T Rachidi, N Assem - Int. J. Com. Dig. Sys, 2019 - academia.edu
In this work, we apply a two stage anomaly-based network intrusion detection process using
the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests …

Network Based Intrusion Detection Using the UNSW-NB15 Dataset.

S Meftah, T Rachidi, N Assem - International Journal of Computing and …, 2019 - go.gale.com
With the proliferation of network services exposed to the outside world (web servers,
application servers, remote procedure call services, etc.), over the last couple decades the …

[PDF][PDF] Network Based Intrusion Detection Using the UNSW-NB15 Dataset

S Meftah, T Rachidi, N Assem - Int. J. Com. Dig. Sys, 2019 - pdfs.semanticscholar.org
In this work, we apply a two stage anomaly-based network intrusion detection process using
the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests …

[PDF][PDF] Network Based Intrusion Detection Using the UNSW-NB15 Dataset

S Meftah, T Rachidi, N Assem - Int. J. Com. Dig. Sys, 2019 - academia.edu
In this work, we apply a two stage anomaly-based network intrusion detection process using
the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests …