Login / Signup
Using Misuse Patterns for VoIP Steganalysis.
Juan C. Pelaez
Published in:
DEXA Workshops (2009)
Keyphrases
</>
anomaly detection
frequent patterns
pattern mining
similar patterns
real time
data mining techniques
spatial domain
neural network
web services
intrusion detection
interesting patterns
discrete cosine transform
ip networks