Login / Signup
Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train.
Nobutaka Kawaguchi
Hideyuki Tomimura
Tetsutoshi Komiyama
Kosuke Kubota
Mamoru Tsuichihara
Published in:
ISCC (2017)
Keyphrases
</>
spike trains
detect malicious
single neuron
detecting malicious
countermeasures
malicious activities
real time
anomaly detection
network traffic
security mechanisms
computer security