Login / Signup
Automated signature extraction for high volume attacks.
Yehuda Afek
Anat Bremler-Barr
Shir Landau Feibish
Published in:
ANCS (2013)
Keyphrases
</>
high volume
real time
big data
countermeasures
signature verification
social networks
real world
data analysis
resource constrained