Utilising Flow Aggregation to Classify Benign Imitating Attacks.
Hanan HindyRobert C. AtkinsonChristos TachtatzisEthan BayneMiroslav BuresXavier J. A. BellekensPublished in: Sensors (2021)
Keyphrases
- detecting malicious
- flow field
- breast cancer
- watermarking scheme
- countermeasures
- traffic analysis
- flow patterns
- security protocols
- data aggregation
- security mechanisms
- decision trees
- cyber attacks
- malware detection
- security threats
- information flow
- terrorist attacks
- rank aggregation
- attack detection
- malicious attacks
- denial of service attacks
- operating system