Login / Signup
A Study on the Detection of Abnormal Behavior and Vulnerability Analysis in BYOD.
Taeeun Kim
Published in:
IoT 360 (2) (2015)
Keyphrases
</>
abnormal behavior
experimental study
detection algorithm
automatic detection
data sets
data mining
object detection
statistical analysis
anomaly detection
false positives
theoretical framework
simulation study
false alarms