Stealthy Malware Traffic - Not as Innocent as It Looks.
Xingsi ZhongYu FuLu YuRichard R. BrooksPublished in: CoRR (2017)
Keyphrases
- network traffic
- traffic control
- malicious code
- traffic flow
- internet traffic
- traffic analysis
- malware detection
- data mining
- traffic monitoring
- traffic management
- telecommunication networks
- road network
- real time
- traffic congestion
- traffic light
- control flow
- network resources
- cellular automata
- traffic engineering
- traffic volume
- detect malicious