Login / Signup
Building suspiciousness cascading graph over multiple hosts for detecting targeted attacks.
Nobutaka Kawaguchi
Hideyuki Tomimura
Mamoru Tsuichihara
Published in:
ICC (2016)
Keyphrases
</>
graph theory
data mining
website
graph structure
countermeasures
graph representation
random graphs