Login / Signup
Safely Harnessing Wide Area Surrogate Computing or How to Avoid Building the Perfect Platform for Network Attacks.
Sachin Goyal
John Carter
Published in:
WORLDS (2004)
Keyphrases
</>
network attacks
intrusion detection
network intrusion detection
collective intelligence
network security
real world
decision trees
data sources
dos attacks