Login / Signup
Fatih: Detecting and Isolating Malicious Routers.
Alper Tugay Mizrak
Yuchung Cheng
Keith Marzullo
Stefan Savage
Published in:
DSN (2005)
Keyphrases
</>
detect malicious
end to end
malicious activities
detecting malicious
neural network
data mining
high speed
malicious behavior
real time
databases
image sequences
similarity measure
digital libraries