Login / Signup

Detection of suspicious internet traffic based on differential analysis and logical rules.

Mohammed Ali ElsiddigMohammed Mejri
Published in: J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
  • logical rules
  • network traffic
  • internet traffic
  • databases
  • information systems
  • anomaly detection
  • probabilistic model
  • supervised learning
  • detection rate