Login / Signup
On the testing of network cyber threat detection methods on spam example.
Robert Filasiak
Maciej Grzenda
Marcin Luckner
Pawel Zawistowski
Published in:
Ann. des Télécommunications (2014)
Keyphrases
</>
email
object detection
network model
preprocessing
data mining techniques
empirical studies
detection algorithm
detection rate
significant improvement
wireless sensor networks
sensor networks
peer to peer
test cases
false positives
false alarms