Login / Signup
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
Ravichander Vaidyanathan
Abhrajit Ghosh
Yukiko Sawaya
Ayumu Kubota
Published in:
ICNC (2012)
Keyphrases
</>
detect malicious
network traffic
data structure
traffic data
detecting malicious
intrusion detection
road network
traffic flow