Sign in

Malicious Cyber Activity Detection Using Zigzag Persistence.

Audun MyersAlyson BittnerSinan AksoyDaniel M. BestGregory Henselman-PetrusekHelen JenneCliff A. JoslynBill KayGarret SeppalaStephen J. YoungEmilie Purvine
Published in: CoRR (2023)
Keyphrases
  • activity detection
  • iris recognition
  • cyber security
  • sequence matching
  • databases