Login / Signup
How to trick the Borg: threat models against manual and automated techniques for detecting network attacks.
Carl Sabottke
Daniel Chen
Lucas Layman
Tudor Dumitras
Published in:
Comput. Secur. (2019)
Keyphrases
</>
semi automatic
machine learning
network intrusion detection
bayesian networks
sensor networks
data warehouse
peer to peer
model selection