Login / Signup
Identifying malicious hosts involved in periodic communications.
Giovanni Apruzzese
Mirco Marchetti
Michele Colajanni
Gabriele Gambigliani Zoccoli
Alessandro Guido
Published in:
NCA (2017)
Keyphrases
</>
communication systems
network traffic
data sets
real world
case study
multi agent
malicious code
real time
image processing
cooperative
mobile agents
communication networks
network management
malicious behavior