Login / Signup
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
George Stergiopoulos
Panagiotis Petsanas
Panagiotis Katsaros
Dimitris Gritzalis
Published in:
SECRYPT (2015)
Keyphrases
</>
object detection
detection algorithm
automated analysis
false alarms
detection method
fully automated
shortest path
learning algorithm
semi automated
detection accuracy
hidden markov models
case study
digital images
semi automatic
computer aided
state space
website
machine learning
automated detection