Login / Signup

Watch your constants: malicious Streebog.

Riham AlTawyAmr M. Youssef
Published in: IET Inf. Secur. (2015)
Keyphrases
  • malicious behavior
  • malicious attacks
  • detect malicious
  • databases
  • real time
  • genetic algorithm
  • information systems
  • decision making
  • metadata
  • data streams
  • malicious users
  • insider attacks