dc.contributor.author | Gzyl, Henryk | |
dc.contributor.author | ter Horst, Enrique | |
dc.contributor.author | Peña García, Nathalie | |
dc.contributor.author | Torres, Andres | |
dc.date.accessioned | 2024-08-05T14:23:29Z | |
dc.date.available | 2024-08-05T14:23:29Z | |
dc.date.issued | 2023-10-24 | |
dc.identifier.issn | 1099-4300 | |
dc.identifier.uri | http://hdl.handle.net/10726/5517 | |
dc.language.iso | eng | |
dc.publisher | MDPI | |
dc.title | Understanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the mean | eng |
dc.type | article | |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | |
dc.rights.local | Abierto (Texto Completo) | |
dc.type.version | info:eu-repo/semantics/acceptedVersion | |
dc.identifier.instname | instname:Colegio de Estudios Superiores de Administración – CESA | |
dc.identifier.reponame | reponame:Biblioteca Digital – CESA | |
dc.identifier.repourl | repourl:https://repository.cesa.edu.co/ | |
dc.description.abstractenglish | The security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connections | eng |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.relation.citationvolume | 25 | |
dc.relation.citationissue | 11 | |
dc.contributor.orcid | Gzyl, Henryk [0000-0002-3781-8848] | |
dc.contributor.orcid | ter Horst, Enrique [0000-0001-5153-1475] | |
dc.contributor.orcid | Peña García, Nathalie [0000-0002-6594-5940] | |
dc.type.driver | info:eu-repo/semantics/article | |
dc.type.redcol | http://purl.org/redcol/resource_type/ART | |
dc.type.coarversion | http://purl.org/coar/version/c_71e4c1898caa6e32 | |
dc.contributor.scopus | Gzyl, Henryk [6701665186] | |
dc.contributor.scopus | ter Horst, Enrique [25655619900] | |
dc.contributor.scopus | Peña García, Nathalie [57202849705] | |
dc.contributor.scopus | Torres, Andres [58729136400] | |
dc.description.orcid | https://orcid.org/0000-0002-3781-8848 | |
dc.description.orcid | https://orcid.org/0000-0001-5153-1475 | |
dc.description.orcid | https://orcid.org/0000-0002-6594-5940 | |
dc.description.scopus | https://www.scopus.com/authid/detail.uri?authorId=6701665186 | |
dc.description.scopus | https://www.scopus.com/authid/detail.uri?authorId=25655619900 | |
dc.description.scopus | https://www.scopus.com/authid/detail.uri?authorId=57202849705 | |
dc.description.scopus | https://www.scopus.com/authid/detail.uri?authorId=58729136400 | |
dc.relation.ispartofjournal | Entropy | |
dc.identifier.doi | https://doi.org/10.3390/e25111476 | |
dc.subject.proposal | Cyber security | |
dc.subject.proposal | Web application firewalls | |
dc.subject.proposal | Feature space | |
dc.subject.proposal | Decision boundary | |
dc.subject.proposal | Maximum entropy in the mean | |