Login / Signup

Constructing Correlations in Attack Connection Chains Using Active Perturbation.

Qiang LiYan LinKun LiuJiubin Ju
Published in: AAIM (2005)
Keyphrases
  • countermeasures
  • real time
  • active databases
  • computer vision
  • highly correlated
  • malicious attacks