Login / Signup
Technical Soddi Defenses: The Trojan Horse Defense Revisited.
Chad M. S. Steel
Published in:
J. Digit. Forensics Secur. Law (2014)
Keyphrases
</>
network security
intrusion detection
databases
machine learning
dos attacks
search engine
feature selection
decision making
website
image segmentation
anomaly detection
intrusion detection system
computer networks
ddos attacks
network layer
computer virus