![Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition](https://www.pdfsearch.io/img/a5c4b0256f3f6acbe19f33fc94d33a0c.jpg) Date: 2015-10-20 12:57:31Computer network security Cyberwarfare Computer security Machine learning Cryptography Anomaly detection Intrusion detection system Botnet Algorithm NP Internet security Pattern recognition | | Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43Add to Reading ListSource URL: norbert-pohlmann.comDownload Document from Source Website File Size: 293,00 KBShare Document on Facebook
|