Using Global Honeypot Networks to Detect Targeted ICS Attacks.
Michael DodsonAlastair R. BeresfordMikael VingaardPublished in: CyCon (2020)
Keyphrases
- social networks
- detecting malicious
- neural network
- detect malicious
- network attacks
- digital watermark
- countermeasures
- network size
- network structure
- detection method
- automatic detection
- network analysis
- complex networks
- heterogeneous networks
- cryptographic protocols
- traffic analysis
- malicious attacks
- detection algorithm
- web applications
- data mining