Login / Signup
Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Teryl Taylor
Xin Hu
Ting Wang
Jiyong Jang
Marc Ph. Stoecklin
Fabian Monrose
Reiner Sailer
Published in:
CODASPY (2016)
Keyphrases
</>
similarity search
detecting malicious
similarity searching
detect malicious
metric space
data partitioning
high dimensional
similarity measure
indexing techniques
r tree
high dimensional data
knn
query processing
neural network
fault tolerant
end hosts
feature space