Login / Signup

Anomaly-Based Identification of Large-Scale Attacks.

Thomas Gamer
Published in: GLOBECOM (2009)
Keyphrases
  • small scale
  • anomaly detection
  • real world
  • real life
  • countermeasures
  • learning algorithm
  • intrusion detection
  • watermarking scheme
  • traffic analysis
  • data sets
  • security threats
  • malicious attacks
  • security vulnerabilities