C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
Siqi Xia
Sutharshan Rajasegarar
Christopher Leckie
Sarah M. Erfani
Jeffrey Chan
Published in:
NSS (2022)
Keyphrases
</>
network flow
information sources
lightweight
information sharing
security policies