Login / Signup

Cyberdefense When Attackers Mimic Legitimate Users: A Bayesian Approach.

Atin BasuchoudharyMohamed EltoweissyMohamed AzabLaura RazzoliniShimaa Mohamed
Published in: IRI (2015)
Keyphrases
  • visualization tool
  • email
  • website
  • databases
  • genetic algorithm
  • recommender systems
  • collaborative filtering