Login / Signup
Characterizing Transition Behaviors in Internet Attack Sequences.
Haitao Du
Shanchieh Jay Yang
Published in:
ICCCN (2011)
Keyphrases
</>
hidden markov models
internet users
email
internet technology
human behavior
variable length
malicious behavior
data sets
dos attacks
ddos attacks
behavior analysis
web technologies
information services
sequential patterns
anomaly detection
mobile devices
image sequences