Login / Signup
Detecting Byzantine Attacks Without Clean Reference.
Ruohan Cao
Tan F. Wong
Tiejun Lv
Hui Gao
Shaoshi Yang
Published in:
CoRR (2016)
Keyphrases
</>
network intrusion detection systems
fault tolerant
countermeasures
security threats
detecting malicious
video sequences
cooperative
intrusion detection system
malicious attacks
malicious users
data sets
data mining
anomaly detection
traffic analysis
misuse detection