Login / Signup

How to trick the Borg: threat models against manual and automated techniques for detecting network attacks.

Carl SabottkeDaniel ChenLucas LaymanTudor Dumitras
Published in: Comput. Secur. (2019)
Keyphrases
  • semi automatic
  • machine learning
  • network intrusion detection
  • bayesian networks
  • sensor networks
  • data warehouse
  • peer to peer
  • model selection