Login / Signup
Identification of Dependency-based Attacks on Node.js.
Brian Pfretzschner
Lotfi Ben Othmane
Published in:
ARES (2017)
Keyphrases
</>
black hole
automatic identification
tree structure
countermeasures
security threats
malicious attacks
database
neural network
decision trees
directed graph
traffic analysis
terrorist attacks
attack detection