Sign in

Malicious Cyber Activity Detection using Zigzag Persistence.

Audun MyersAlyson BittnerSinan AksoyDaniel M. BestGregory Henselman-PetrusekHelen JenneCliff A. JoslynBill KayGarret SeppalaStephen J. YoungEmilie Purvine
Published in: DSC (2023)
Keyphrases
  • activity detection
  • sequence matching
  • iris recognition
  • cyber security
  • feature extraction
  • lower bound
  • databases
  • keywords
  • data model
  • action recognition