Login / Signup

Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train.

Nobutaka KawaguchiHideyuki TomimuraTetsutoshi KomiyamaKosuke KubotaMamoru Tsuichihara
Published in: ISCC (2017)
Keyphrases
  • spike trains
  • detect malicious
  • single neuron
  • detecting malicious
  • countermeasures
  • malicious activities
  • real time
  • anomaly detection
  • network traffic
  • security mechanisms
  • computer security