Login / Signup

Building suspiciousness cascading graph over multiple hosts for detecting targeted attacks.

Nobutaka KawaguchiHideyuki TomimuraMamoru Tsuichihara
Published in: ICC (2016)
Keyphrases
  • graph theory
  • data mining
  • website
  • graph structure
  • countermeasures
  • graph representation
  • random graphs