Login / Signup
Modeling Distributed Network Attacks with Constraints.
Pedro D. Salgueiro
Salvador Abreu
Published in:
IDC (2011)
Keyphrases
</>
network attacks
meeting scheduling
distributed systems
multi agent
network intrusion detection
high dimensional
peer to peer
unsupervised learning
distributed constraint optimization problems
data processing
computer systems
intrusion detection
information security
network security