Mostrar el registro sencillo del ítem

dc.contributor.authorGzyl, Henryk
dc.contributor.authorter Horst, Enrique
dc.contributor.authorPeña García, Nathalie
dc.contributor.authorTorres, Andres
dc.date.accessioned2024-08-05T14:23:29Z
dc.date.available2024-08-05T14:23:29Z
dc.date.issued2023-10-24
dc.identifier.issn1099-4300
dc.identifier.urihttp://hdl.handle.net/10726/5517
dc.language.isoeng
dc.publisherMDPI
dc.titleUnderstanding the feature space and decision boundaries of commercial WAFs using maximum entropy in the meaneng
dc.typearticle
dc.rights.accessrightsinfo:eu-repo/semantics/openAccess
dc.rights.localAbierto (Texto Completo)
dc.type.versioninfo:eu-repo/semantics/acceptedVersion
dc.identifier.instnameinstname:Colegio de Estudios Superiores de Administración – CESA
dc.identifier.reponamereponame:Biblioteca Digital – CESA
dc.identifier.repourlrepourl:https://repository.cesa.edu.co/
dc.description.abstractenglishThe security of a network requires the correct identification and characterization of the attacks through its ports. This involves the follow-up of all the requests for access to the networks by all kinds of users. We consider the frequency of connectionseng
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.relation.citationvolume25
dc.relation.citationissue11
dc.contributor.orcidGzyl, Henryk [0000-0002-3781-8848]
dc.contributor.orcidter Horst, Enrique [0000-0001-5153-1475]
dc.contributor.orcidPeña García, Nathalie [0000-0002-6594-5940]
dc.type.driverinfo:eu-repo/semantics/article
dc.type.redcolhttp://purl.org/redcol/resource_type/ART
dc.type.coarversionhttp://purl.org/coar/version/c_71e4c1898caa6e32
dc.contributor.scopusGzyl, Henryk [6701665186]
dc.contributor.scopuster Horst, Enrique [25655619900]
dc.contributor.scopusPeña García, Nathalie [57202849705]
dc.contributor.scopusTorres, Andres [58729136400]
dc.description.orcidhttps://orcid.org/0000-0002-3781-8848
dc.description.orcidhttps://orcid.org/0000-0001-5153-1475
dc.description.orcidhttps://orcid.org/0000-0002-6594-5940
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=6701665186
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=25655619900
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=57202849705
dc.description.scopushttps://www.scopus.com/authid/detail.uri?authorId=58729136400
dc.relation.ispartofjournalEntropy
dc.identifier.doihttps://doi.org/10.3390/e25111476
dc.subject.proposalCyber security
dc.subject.proposalWeb application firewalls
dc.subject.proposalFeature space
dc.subject.proposalDecision boundary
dc.subject.proposalMaximum entropy in the mean


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem