Login / Signup
Malicious URL protection based on attackers' habitual behavioral analysis.
Sungjin Kim
Jinkook Kim
Brent ByungHoon Kang
Published in:
Comput. Secur. (2018)
Keyphrases
</>
bayesian networks
data acquisition
database
data sets
data mining
database systems
keywords
expert systems
email
statistical analysis
critical infrastructure