Login / Signup
GNN-Based Malicious Network Entities Identification In Large-Scale Network Data.
Stepan Dvorak
Pavel Procházka
Lukás Bajer
Published in:
NOMS (2022)
Keyphrases
</>
peer to peer
network traffic
computer networks
small scale
mobile communication
communication networks
network architecture
massive scale
wireless sensor networks
intrusion detection
network management
network topologies