Login / Signup
Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol.
Asaf Nadler
Avi Aminov
Asaf Shabtai
Published in:
CoRR (2017)
Keyphrases
</>
data sets
data sources
raw data
data analysis
high quality
image data
data processing
computer systems
database
training data
input data
data collection
statistical analysis
sensor data
data structure
data mining techniques
high dimensional data