Login / Signup

Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies.

Idan MoradAsaf Shabtai
Published in: SECITC (2015)
Keyphrases
  • computer systems
  • cyber physical
  • real world
  • automatic detection
  • low dimensional
  • databases
  • information systems
  • expert systems
  • information technology
  • search space
  • solution space