How to trick the Borg: threat models against manual and automated techniques for detecting network attacks

Title
How to trick the Borg: threat models against manual and automated techniques for detecting network attacks
Authors
Keywords
Cyber attack, Human factors, Unsupervised learning, DBSCAN, Log analysis
Journal
COMPUTERS & SECURITY
Volume 81, Issue -, Pages 25-40
Publisher
Elsevier BV
Online
2018-10-14
DOI
10.1016/j.cose.2018.07.022

Ask authors/readers for more resources

Reprint

Contact the author

Discover Peeref hubs

Discuss science. Find collaborators. Network.

Join a conversation

Add your recorded webinar

Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.

Upload Now