Login / Signup
Anomaly-Based Identification of Large-Scale Attacks.
Thomas Gamer
Published in:
GLOBECOM (2009)
Keyphrases
</>
small scale
anomaly detection
real world
real life
countermeasures
learning algorithm
intrusion detection
watermarking scheme
traffic analysis
data sets
security threats
malicious attacks
security vulnerabilities