Login / Signup

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.

Fangming ZhaoTakashi NishideYoshiaki HoriKouichi Sakurai
Published in: ICITCS (2012)
Keyphrases
  • countermeasures
  • information security
  • databases
  • data analysis
  • data mining
  • machine learning
  • preprocessing
  • significant improvement
  • data mining techniques