Login / Signup
Applying episode mining and pruning to identify malicious online attacks.
Ming-Yang Su
Published in:
Comput. Electr. Eng. (2017)
Keyphrases
</>
episode mining
malicious attacks
malicious users
detecting malicious
detect malicious
malicious behavior
real time
data mining
wireless networks
high volume
insider threat