Login / Signup

Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections.

Diana Gratiela BerbecaruAntonio Lioy
Published in: ARES (2024)
Keyphrases
  • insider threat
  • countermeasures
  • email
  • databases
  • anomaly detection
  • sir model
  • detect malicious
  • real time
  • case study
  • database systems
  • automatic identification
  • security architecture