Login / Signup

Using Bipartite Anomaly Features for Cyber Security Applications.

Eric L. GoodmanJoe IngramShawn MartinDirk Grunwald
Published in: ICMLA (2015)
Keyphrases
  • cyber security
  • intrusion detection
  • computer systems
  • data mining
  • decision trees
  • smart grid