Login / Signup

Malicious URL protection based on attackers' habitual behavioral analysis.

Sungjin KimJinkook KimBrent ByungHoon Kang
Published in: Comput. Secur. (2018)
Keyphrases
  • bayesian networks
  • data acquisition
  • database
  • data sets
  • data mining
  • database systems
  • keywords
  • expert systems
  • email
  • statistical analysis
  • critical infrastructure