Cite

Fig. 1

Trustworthy Network Protocol Stack
Trustworthy Network Protocol Stack

Fig. 2

The flow of AdaBoost algorithm for network intrusion detection
The flow of AdaBoost algorithm for network intrusion detection

Fig. 3

Comparison between open data frame and trustworthy data frame
Comparison between open data frame and trustworthy data frame

Fig. 4

The model construction process
The model construction process

Fig. 5

Experimental result
Experimental result
eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics