Login / Signup
Detection of malicious and low throughput data exfiltration over the DNS protocol.
Asaf Nadler
Avi Aminov
Asaf Shabtai
Published in:
Comput. Secur. (2019)
Keyphrases
</>
data sets
data processing
high quality
knowledge discovery
statistical analysis
data mining techniques
data collection
data analysis
data sources
database
computer systems
sensor data
raw data
data mining
data points
high dimensional data
missing data
detection rate
data quality