Login / Signup
A Mining Policy based Malicious Encrypted Traffic Detection Scheme.
Daichong Chao
Published in:
ICCPR (2020)
Keyphrases
</>
detection scheme
real time
privacy sensitive
malicious activities
data mining techniques
optimal policy
web mining
mining algorithm
text mining
knowledge discovery
data mining
frequent patterns
privacy preserving
network traffic
road network
itemsets
traffic flow
ip address
insider threat