Login / Signup

Analyzing anomalies in anonymized SIP traffic.

Jan StanekLukas KenclJiri Kuthan
Published in: Networking (2014)
Keyphrases
  • anomaly detection
  • network traffic
  • traffic patterns
  • privacy preserving
  • information loss
  • private information
  • privacy protection
  • detect anomalies