Login / Signup
Different approaches for the detection of SSH anomalous connections.
Silvia González
Álvaro Herrero
Javier Sedano
Urko Zurutuza
Emilio Corchado
Published in:
Log. J. IGPL (2016)
Keyphrases
</>
anomaly detection
detection algorithm
automatic detection
information systems
case study
object recognition
detecting anomalous
data sets
neural network
information retrieval
object detection
detection method
alternative approaches