Login / Signup
Constructing Correlations in Attack Connection Chains Using Active Perturbation.
Qiang Li
Yan Lin
Kun Liu
Jiubin Ju
Published in:
AAIM (2005)
Keyphrases
</>
countermeasures
real time
active databases
computer vision
highly correlated
malicious attacks