Mladen A. Vouk Collection
Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors: The Internet of Things (Ubiquity symposium)
by Roopak Venkatakrishnan, Mladen A. Vouk
January 2016Cyber-attacks and breaches are often detected too late to avoid damage. While "classical" reactive cyber defenses usually work only if we have some prior knowledge about the attack methods and ...