Login / Signup
Watch your constants: malicious Streebog.
Riham AlTawy
Amr M. Youssef
Published in:
IET Inf. Secur. (2015)
Keyphrases
</>
malicious behavior
malicious attacks
detect malicious
databases
real time
genetic algorithm
information systems
decision making
metadata
data streams
malicious users
insider attacks