Login / Signup
Using DNS Patterns for Automated Cyber Threat Attribution.
Cristoffer Leite
Jerry den Hartog
Daniel Ricardo dos Santos
Published in:
ARES (2024)
Keyphrases
</>
pattern discovery
load balancing
similar patterns
cyber crime
data analysis
frequent patterns
pattern mining
fully automated
semi automated
databases
information systems
design patterns
cyber security