• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

How to trick the Borg: threat models against manual and automated techniques for detecting network attacks.

Carl SabottkeDaniel ChenLucas LaymanTudor Dumitras
Published in: Comput. Secur. (2019)
Keyphrases
  • semi automatic
  • machine learning
  • network intrusion detection
  • bayesian networks
  • sensor networks
  • data warehouse
  • peer to peer
  • model selection