Login / Signup
Detection of SSH host spoofing in control systems through network telemetry analysis.
Stanislav Ponomarev
Nathan Wallace
Travis Atkison
Published in:
CISR (2014)
Keyphrases
</>
control system
peer to peer
detection method
false alarms
network model
automatic analysis
forensic analysis
computer vision
image analysis
event detection
quantitative analysis
detection accuracy
network management