Login / Signup
Defeat scanning worms in cyber warfare.
Fu-Hau Hsu
Li-Han Chen
Chia-Jun Lin
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
intrusion detection
cyber security
network traffic
scan data
structured light
cyber defense
data sets
simulation models
network centric
real time
website
multi agent
expert systems
cyber crime
information warfare