Login / Signup
Integrating Asterisk with InRule to Detect Suspicious Calls.
Ahmad Hammoud
Daniel Bourget
Published in:
AICT (2010)
Keyphrases
</>
anomaly detection
detection method
detect malicious
detection algorithm
detecting malicious
feature selection
evolutionary algorithm
automatic detection
knowledge base
image segmentation
object recognition
information technology
network traffic