Login / Signup
Using Bayesian Attack Detection Models to Drive Cyber Deception.
James Jones
Kathryn B. Laskey
Published in:
BMA@UAI (2014)
Keyphrases
</>
attack detection
data processing