Login / Signup
Detecting and Analyzing Zero-Day Attacks Using Honeypots.
Constantin Musca
Emma Mirica
Razvan Deaconescu
Published in:
CSCS (2013)
Keyphrases
</>
databases
data sets
neural network
artificial intelligence
knowledge base
mobile devices
probabilistic model
automatically detecting