Login / Signup
Strategic Topology Switching for Security-Part II: Detection & Switching Topologies.
Yanbing Mao
Emrah Akyol
Ziang Zhang
Published in:
CoRR (2017)
Keyphrases
</>
detection method
case study
detection accuracy
automatic detection
computer vision
false alarms
information assurance
data sets
false positives
detection algorithm
access control
object detection
database systems
neural network
information security
network security
security issues