Login / Signup
Detecting Intruders Using a Long Connection Chain to Connect to a Host.
Wei Ding
Shou-Hsuan Stephen Huang
Published in:
AINA (2011)
Keyphrases
</>
image processing
face recognition
social networks
decision making
pattern recognition
digital libraries
special case
digital images
data mining techniques
intrusion detection system
automatic detection
automatically detecting