Login / Signup
Cyber threat modeling and validation: port scanning and detection.
Eric D. Vugrin
Jerry Cruz
Christian Reedy
Thomas D. Tarman
Ali Pinar
Published in:
HotSoS (2020)
Keyphrases
</>
detection method
automatic detection
detection algorithm
detection accuracy
model validation
neural network
false positives
false alarms
databases
information systems
partial occlusion
modeling framework