Login / Signup
K-factor Gegenbauer ARMA process for network traffic simulation.
Nayera M. Sadek
Alireza Khotanzad
Published in:
ISCC (2004)
Keyphrases
</>
network traffic
intrusion detection
long range dependence
anomaly detection
intrusion detection system
computer networks
network intrusion detection
shortest path
traffic data
network monitoring
traffic volume
detecting anomalous