• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.

Siqi XiaSutharshan RajasegararChristopher LeckieSarah M. ErfaniJeffrey Chan
Published in: NSS (2022)
Keyphrases
  • network flow
  • information sources
  • lightweight
  • information sharing
  • security policies