Login / Signup
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
Siqi Xia
Sutharshan Rajasegarar
Christopher Leckie
Sarah M. Erfani
Jeffrey Chan
Published in:
NSS (2022)
Keyphrases
</>
network flow
information sources
lightweight
information sharing
security policies