Login / Signup
Malicious BGP hijacks: Appearances can be deceiving.
Pierre-Antoine Vervier
Quentin Jacquemart
Johann Schlamp
Olivier Thonnard
Georg Carle
Guillaume Urvoy-Keller
Ernst W. Biersack
Marc Dacier
Published in:
ICC (2014)
Keyphrases
</>
anomaly detection
appearance model
malicious behavior
malicious attacks
malicious users
detect malicious
machine learning
genetic algorithm
malicious code
network traffic
detecting malicious
insider attacks
malicious activities
database
privacy preserving
operating system
computer vision
neural network