C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Different approaches for the detection of SSH anomalous connections.
Silvia González
Álvaro Herrero
Javier Sedano
Urko Zurutuza
Emilio Corchado
Published in:
Log. J. IGPL (2016)
Keyphrases
</>
anomaly detection
detection algorithm
automatic detection
information systems
case study
object recognition
detecting anomalous
data sets
neural network
information retrieval
object detection
detection method
alternative approaches