Show simple item record

dc.contributor.authorGzyl, Henryk
dc.contributor.authorter Horst, Enrique
dc.contributor.authorPeña García, Nathalie
dc.contributor.authorTorres, Andres
dc.date.accessioned2024-08-05T14:23:29Z
dc.date.available2024-08-05T14:23:29Z
dc.date.issued2023-10-24
dc.identifier.issn1099-4300
dc.identifier.urihttp://hdl.handle.net/10726/5517
dc.language.isoeng
dc.publisherMDPI
dc.titleUnderstanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the meaneng
dc.typearticle
dc.rights.accessrightsinfo:eu-repo/semantics/openAccess
dc.rights.localAbierto (Texto Completo)
dc.type.versioninfo:eu-repo/semantics/acceptedVersion
dc.identifier.instnameinstname:Colegio de Estudios Superiores de Administración – CESA
dc.identifier.reponamereponame:Biblioteca Digital – CESA
dc.identifier.repourlrepourl:https://repository.cesa.edu.co/
dc.description.abstractenglishThe security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connectionseng
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.relation.citationvolume25
dc.relation.citationissue11
dc.contributor.orcidGzyl, Henryk [0000-0002-3781-8848]
dc.contributor.orcidter Horst, Enrique [0000-0001-5153-1475]
dc.contributor.orcidPeña García, Nathalie [0000-0002-6594-5940]
dc.type.driverinfo:eu-repo/semantics/article
dc.type.redcolhttp://purl.org/redcol/resource_type/ART
dc.type.coarversionhttp://purl.org/coar/version/c_71e4c1898caa6e32
dc.contributor.scopusGzyl, Henryk [6701665186]
dc.contributor.scopuster Horst, Enrique [25655619900]
dc.contributor.scopusPeña García, Nathalie [57202849705]
dc.contributor.scopusTorres, Andres [58729136400]
dc.description.orcidhttps://orcid.org/0000-0002-3781-8848
dc.description.orcidhttps://orcid.org/0000-0001-5153-1475
dc.description.orcidhttps://orcid.org/0000-0002-6594-5940
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=6701665186
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=25655619900
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=57202849705
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=58729136400
dc.relation.ispartofjournalEntropy
dc.identifier.doihttps://doi.org/10.3390/e25111476
dc.subject.proposalCyber security
dc.subject.proposalWeb application firewalls
dc.subject.proposalFeature space
dc.subject.proposalDecision boundary
dc.subject.proposalMaximum entropy in the mean


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record