Login / Signup

Fatih: Detecting and Isolating Malicious Routers.

Alper Tugay MizrakYuchung ChengKeith MarzulloStefan Savage
Published in: DSN (2005)
Keyphrases
  • detect malicious
  • end to end
  • malicious activities
  • detecting malicious
  • neural network
  • data mining
  • high speed
  • malicious behavior
  • real time
  • databases
  • image sequences
  • similarity measure
  • digital libraries