Login / Signup
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.
Fangming Zhao
Takashi Nishide
Yoshiaki Hori
Kouichi Sakurai
Published in:
ICITCS (2012)
Keyphrases
</>
countermeasures
information security
databases
data analysis
data mining
machine learning
preprocessing
significant improvement
data mining techniques