Login / Signup
Identifying compromised hosts under APT using DNS request sequences.
Ming Li
Qiang Li
Guangzhe Xuan
Dong Guo
Published in:
J. Parallel Distributed Comput. (2021)
Keyphrases
</>
test sequences
hidden markov models
sequential patterns
long sequences
network traffic
real time
load balancing
mobile agents
database systems
mobile devices
three dimensional
variable length
sequential data
sequence alignment
pseudorandom
web services
sequence analysis
genetic algorithm