Login / Signup

Applying episode mining and pruning to identify malicious online attacks.

Ming-Yang Su
Published in: Comput. Electr. Eng. (2017)
Keyphrases
  • episode mining
  • malicious attacks
  • malicious users
  • detecting malicious
  • detect malicious
  • malicious behavior
  • real time
  • data mining
  • wireless networks
  • high volume
  • insider threat