Login / Signup
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.
Andrey M. Dolgikh
Tomas Nykodym
Victor A. Skormin
Zachary Birnbaum
Published in:
MMM-ACNS (2012)
Keyphrases
</>
cyber attacks
cyber security
decision making
real time
mobile devices
low cost
data processing
lightweight
countermeasures