[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/entropy/KomisarekPKHC21>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Marek_Pawlicki>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Michal_Choras>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Mikolaj_Komisarek>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Rafal_Kozik>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Witold_Holubowicz>
foaf:homepage <http://dx.doi.org/doi.org%2F10.3390%2Fe23111532>
foaf:homepage <https://doi.org/10.3390/e23111532>
dc:identifier DBLP journals/entropy/KomisarekPKHC21 (xsd:string)
dc:identifier DOI doi.org%2F10.3390%2Fe23111532 (xsd:string)
dcterms:issued 2021 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/entropy>
rdfs:label How to Effectively Collect and Process Network Data for Intrusion Detection? (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Marek_Pawlicki>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Michal_Choras>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Mikolaj_Komisarek>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Rafal_Kozik>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Witold_Holubowicz>
swrc:number 11 (xsd:string)
swrc:pages 1532 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/entropy/KomisarekPKHC21/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/entropy/KomisarekPKHC21>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/entropy/entropy23.html#KomisarekPKHC21>
rdfs:seeAlso <https://doi.org/10.3390/e23111532>
dc:title How to Effectively Collect and Process Network Data for Intrusion Detection? (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 23 (xsd:string)