Login / Signup
Mining and Utilizing Network Protocol's Stealth Attack Behaviors.
Yanjing Hu
Xu An Wang
Haining Luo
Shuaishuai Zhu
Published in:
3PGCIC (2018)
Keyphrases
</>
data mining
text mining
web mining
mining algorithm
knowledge discovery
association rule mining
data mining methods
human behavior
neural network
countermeasures
malicious behavior
website
privacy preserving
sequential patterns
behavior patterns