Login / Signup
Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis.
Felix von Eye
Michael Grabatin
Wolfgang Hommel
Published in:
Prax. Inf.verarb. Kommun. (2016)
Keyphrases
</>
flow analysis
information flow
hidden markov models
forensic analysis
sequential patterns
satisfiability problem
long sequences
data mining
neural network
information systems
case study
sat solvers
temporal patterns
sat instances