Login / Signup
Simulation-based and Graph oriented Approach to Detection of Network Attacks.
Alexey Meleshko
Vasily Desnitsky
Igor V. Kotenko
Published in:
MECO (2022)
Keyphrases
</>
network attacks
intrusion detection
network intrusion detection
intrusion detection system
network security
network intrusions
dos attacks
graph structure
databases
anomaly detection
detection algorithm
data mining
machine learning
metadata
weighted graph