default search action
"Using behavior analysis algorithms to anticipate security threats before ..."
Brian Banks et al. (2007)
- Brian Banks, Gary M. Jackson, John J. Helly, David N. Chin, T. J. Smith, A. Schmidt, Paul C. Brewer, Roger Medd, David Masters, Annetta Burger, William K. Krebs:
Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations. AVSS 2007: 307-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.