Login / Signup
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Mohammed H. Sqalli
Syed Naeem Firdous
Zubair A. Baig
Farag Azzedin
Published in:
CW (2011)
Keyphrases
</>
malicious activities
intrusion detection system
online social networks
identity theft
false positive rate
security issues
network traffic
insider threat
intrusion detection
data mining
social networks
data streams
social network analysis
personal information