Login / Signup
Adapting with Honeypot Configurations to Detect Evolving Exploits.
Marcus Gutierrez
Christopher Kiekintveld
Published in:
AAMAS (2017)
Keyphrases
</>
detection algorithm
detection method
automatic detection
automatically detecting
takes advantage
database
computer vision
metadata
hidden markov models
digital watermark