@inproceedings{moustafa:hal-01988843, TITLE = {{A Network Forensic Scheme Using Correntropy-Variation for Attack Detection}}, AUTHOR = {Moustafa, Nour and Slay, Jill}, URL = {https://inria.hal.science/hal-01988843}, NOTE = {Part 3: Network Forensics}, BOOKTITLE = {{14th IFIP International Conference on Digital Forensics (DigitalForensics)}}, ADDRESS = {New Delhi, India}, EDITOR = {Gilbert Peterson and Sujeet Shenoi}, PUBLISHER = {{Springer International Publishing}}, SERIES = {Advances in Digital Forensics XIV}, VOLUME = {AICT-532}, PAGES = {225-239}, YEAR = {2018}, MONTH = Jan, DOI = {10.1007/978-3-319-99277-8\_13}, KEYWORDS = {Network forensics ; cyber attacks ; correntropy-variation technique}, PDF = {https://inria.hal.science/hal-01988843/file/472401_1_En_13_Chapter.pdf}, HAL_ID = {hal-01988843}, HAL_VERSION = {v1}, }