Login / Signup
Defending against Internet worms: a signature-based approach.
Yong Tang
Shigang Chen
Published in:
INFOCOM (2005)
Keyphrases
</>
email
data sets
network traffic
internet users
signature recognition
database
neural network
machine learning
information retrieval
search engine
case study
information services
world wide web
internet access
signature verification
internet traffic