Login / Signup

Identifying malicious hosts involved in periodic communications.

Giovanni ApruzzeseMirco MarchettiMichele ColajanniGabriele Gambigliani ZoccoliAlessandro Guido
Published in: NCA (2017)
Keyphrases
  • communication systems
  • network traffic
  • data sets
  • real world
  • case study
  • multi agent
  • malicious code
  • real time
  • image processing
  • cooperative
  • mobile agents
  • communication networks
  • network management
  • malicious behavior