Login / Signup
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Xiaochun Yun
Jiang Xie
Shuhao Li
Yongzheng Zhang
Peishuai Sun
Published in:
Comput. Secur. (2022)
Keyphrases
</>
website
real time
image features
communication patterns
feature extraction
feature vectors
classification accuracy
feature set
behavioral patterns
flow control
traffic patterns
open source
information sharing
behavior patterns