Login / Signup

Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.

Siqi XiaSutharshan RajasegararChristopher LeckieSarah M. ErfaniJeffrey Chan
Published in: NSS (2022)
Keyphrases
  • network flow
  • information sources
  • lightweight
  • information sharing
  • security policies