Sign in

Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.

Da-Yu KaoShiuh-Jeng WangFrank Fu-Yuan HuangSajal BhatiaSaurabh Gupta
Published in: ISI Workshops (2008)
Keyphrases
  • information systems
  • learning algorithm
  • metadata
  • data analysis
  • association rules
  • pairwise
  • wireless sensor networks
  • data management
  • intelligent agents
  • network attacks