Network Anomaly Detection Using Co-clustering
Encyclopedia of Social Network Analysis and Mining, pp. 403-410, 2014.
different co-clustering algorithmearly internet architecture designsocial networknormal connectioninternet attackMore(8+)
Early Internet architecture design goals did not put security as a high priority. However, today Internet security is a quickly growing concern. The prevalence of Internet attacks has increased significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service providers, requiring system administ...More