Login / Signup
Signature-based approach to detecting malicious outgoing traffic.
Natalia Petliak
Yurii Klots
Vira Titova
Viktor Cheshun
Artem Boyarchuk
Published in:
IntelITSIS (2023)
Keyphrases
</>
detecting malicious
detect malicious
end hosts
network traffic
response time
road network
information retrieval
information systems
traffic data
web pages
traffic flow
traffic analysis
denial of service attacks