Login / Signup
Malicious Cyber Activity Detection using Zigzag Persistence.
Audun Myers
Alyson Bittner
Sinan Aksoy
Daniel M. Best
Gregory Henselman-Petrusek
Helen Jenne
Cliff A. Joslyn
Bill Kay
Garret Seppala
Stephen J. Young
Emilie Purvine
Published in:
DSC (2023)
Keyphrases
</>
activity detection
sequence matching
iris recognition
cyber security
feature extraction
lower bound
databases
keywords
data model
action recognition