Login / Signup

Suspicious FQDN Evaluation based on Variations in Malware Download URLs.

Yasuyuki TanakaAtsuhiro Goto
Published in: ASONAM (2017)
Keyphrases
  • anomaly detection
  • detect malicious
  • neural network
  • machine learning
  • computer vision
  • clustering algorithm
  • face recognition
  • intrusion detection system
  • evaluation model