A Methodology for Runtime Detection and Extraction of Threat Patterns.
Christos BellasAthanasios NaskosGeorgia KougkaGeorge VlahavasAnastasios GounarisAthena VakaliApostolos PapadopoulosEvmorfia BiliriNefeli BountouniGustavo Gonzalez GranadilloPublished in: SN Comput. Sci. (2020)
Keyphrases
- detection accuracy
- pattern detection
- automatic detection
- detection algorithm
- data mining techniques
- detection method
- pattern mining
- case study
- pattern extraction
- change detection
- detection rate
- object detection
- design patterns
- pattern discovery
- temporal patterns
- automatic extraction
- interesting patterns
- information extraction
- hough transform
- detection scheme
- data analysis
- feature extraction and classification
- information systems