Login / Signup
A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution.
Chuck Easttom
Published in:
SAI (3) (2022)
Keyphrases
</>
network intrusion
graph theoretical
network intrusion detection
intrusion detection
network security
graph theory
fraud detection
anomaly detection
network intrusion detection systems
network traffic
intrusion detection system
real world
data analysis
feature vectors
data processing