Please use this identifier to cite or link to this item: http://192.168.98.239:8080/jspui/handle/1994/1784
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2024-11-29T06:06:10Z-
dc.date.available2024-11-29T06:06:10Z-
dc.date.issued2024-
dc.identifier.urihttp://192.168.98.239:8080/jspui/handle/1994/1784-
dc.description.abstractAvailable.en_US
dc.format.extentxxii, 240 p.en_US
dc.language.isoenen_US
dc.publisherTezpur Universityen_US
dc.subjectCritical Infrastructureen_US
dc.subjectCross-site Scriptingen_US
dc.subjectEnsembleen_US
dc.subjectFeature selectionen_US
dc.subjectHTTP Flooding attacksen_US
dc.subjectRelevanceen_US
dc.subjectWeb-based attacksen_US
dc.titleDetection of Web-based Attacks using Machine Learning Techniquesen_US
dc.typeThesisen_US
dc.contributor.guideBhattacharyya, Dhruba Kumar-
dc.contributor.guideKalita, Jugal Kumar-
dc.creator.researcherSarmah, Upasana-
dc.departmentDepartment of Computer Science and Engineeringen_US
Appears in Collections:Theses

Files in This Item:
File Description SizeFormat 
01_title.pdf178.16 kBAdobe PDFView/Open
02_prelim pages.pdf324.17 kBAdobe PDFView/Open
03_content.pdf90.4 kBAdobe PDFView/Open
04_abstract.pdf94.81 kBAdobe PDFView/Open
05_chapter 1.pdf1.5 MBAdobe PDFView/Open
06_chapter 2.pdf4.24 MBAdobe PDFView/Open
07_chapter 3.pdf2.05 MBAdobe PDFView/Open
08_chapter 4.pdf1.76 MBAdobe PDFView/Open
09_chapter 5.pdf822 kBAdobe PDFView/Open
10_chapter 6.pdf6.2 MBAdobe PDFView/Open
11_chapter 7.pdf6.9 MBAdobe PDFView/Open
12_chapter 8.pdf140.78 kBAdobe PDFView/Open
13_annexures.pdf483.92 kBAdobe PDFView/Open
80_Recommendation.pdf317.98 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.