Login / Signup
Detection of suspicious internet traffic based on differential analysis and logical rules.
Mohammed Ali Elsiddig
Mohammed Mejri
Published in:
J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
</>
logical rules
network traffic
internet traffic
databases
information systems
anomaly detection
probabilistic model
supervised learning
detection rate