Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ideal/LimaAS12
%A Lima, Christiane F. L.
%A de Assis, Francisco M.
%A de Souza, Cleonilson Protásio
%B IDEAL
%D 2012
%E Yin, Hujun
%E Costa, José Alfredo Ferreira
%E Barreto, Guilherme De A.
%I Springer
%K dblp
%P 492-501
%T A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection.
%U http://dblp.uni-trier.de/db/conf/ideal/ideal2012.html#LimaAS12
%V 7435
%@ 978-3-642-32638-7
@inproceedings{conf/ideal/LimaAS12,
added-at = {2022-10-02T00:00:00.000+0200},
author = {Lima, Christiane F. L. and de Assis, Francisco M. and de Souza, Cleonilson Protásio},
biburl = {https://www.bibsonomy.org/bibtex/243c249fefa21ffc56e22105de4f238b6/dblp},
booktitle = {IDEAL},
crossref = {conf/ideal/2012},
editor = {Yin, Hujun and Costa, José Alfredo Ferreira and Barreto, Guilherme De A.},
ee = {https://doi.org/10.1007/978-3-642-32639-4_60},
interhash = {dfc4c8d8b4f39ee0fbc05dc1cb7c9f51},
intrahash = {43c249fefa21ffc56e22105de4f238b6},
isbn = {978-3-642-32638-7},
keywords = {dblp},
pages = {492-501},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T16:55:24.000+0200},
title = {A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection.},
url = {http://dblp.uni-trier.de/db/conf/ideal/ideal2012.html#LimaAS12},
volume = 7435,
year = 2012
}