%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEE2018 IEEE 17th International Symposium on Network Computing and Applications (NCA);2018; ; ;10.1109/NCA.2018.8548327Adversarial samplesmachine learningrandom forestintrusion detectionflow inspectionbotnetEvading Botnet Detectors Based on Flows and Random Forest with Adversarial SamplesGiovanni ApruzzeseMichele Colajanni
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)1 November 201810.1109/NCA.2018.85483278
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>/W[3[226 606] 18[529] 24[630] 28[488] 38[459 637] 47[267] 62[423] 69[659] 75[676] 87[532] 90[563] 94[473] 100[495] 104[653]]/Type/Font/Subtype/CIDFontType2/FontDescriptor 5 0 R/DW 1000/CIDToGIDMap/Identity>>
endobj
4 0 obj
<>stream
hT;o0 _qcǦ6*PC;Hkh>mtw7Nvq8GxdNO]wq¾2 E'wv[/Z,`oAי,j?LBYBm6/ʾ'*NB|]:d[\rY2JD,*iM$MQ%EKI{6JFI.+T9"}vMʩ9"y5t9<vaJ~ /
endstream
endobj
5 0 obj
<>
endobj
7 0 obj
<>
endobj
8 0 obj
<>
endobj
9 0 obj
<>
endobj
10 0 obj
<>
endobj
11 0 obj
<>
endobj
12 0 obj
<>
endobj
13 0 obj
<>
endobj
14 0 obj
<>
endobj
15 0 obj
<>
endobj
16 0 obj
<>
endobj
17 0 obj
<>stream
hX_lEf-w`β`;Lh8[Zhڴ5MhҳT"&*%x4j4j#c11mQxMf7ӽl @v%S]7_B+;zE(
c%)5Uz#*P:>]MG Khv7 "jpv\eh7ۋ |@(
C'?\WJő%%Ḇ&qW:gOP1(>pk:I{x)б2Qҳiq-?{j/.!r'xރ3D uYx
wc&O
Lvbmc9ZVCDkK4L0;f=%hR4%drWM?Κ
圅\f;^Ibvz' xL{CeP^sQ
+`>I0[uʤ[tXB9O>ixAUթqUÈ~l'h$= hjn15-喼^eI,?NL ;j5-NxԊlwk)7NH*ZN˭e=.|J0a5|\Yt|q'5j&Geֆ$ ȐLc#i?B/8#7nwbzc'7g:q8N(^|>b!C??ӧq*OJC+8Cu&DZ{5Xs]_z~ )2$#OC;vX6!f*^Jbέ7lLL4616ap@
m~d).p籗cytٻ~]@Xح)l8-2P&&d['gߙ}4_=1%pZ!}nA~9/3gNKMx_`Xajj'.NVd┭+7&2jg`j\T9'e/%/jͺt5i-8k8Yas֙gnl b%ӀM}B[hEpcD,îW?zUs>ssqkOc`ԵaVF^+'/Q}YW'p+YVWa=vu ]]A&iba@0,ʏ^41(^J8섃8ލ|z; Sk#0Zm,JױrV(n\aa{qnߣ5>Ǣtr:Cvoֆ;3oX^=r:q