Login / Signup
Analyzing anomalies in anonymized SIP traffic.
Jan Stanek
Lukas Kencl
Jiri Kuthan
Published in:
Networking (2014)
Keyphrases
</>
anomaly detection
network traffic
traffic patterns
privacy preserving
information loss
private information
privacy protection
detect anomalies