Login / Signup
Modeling network traffic by a cluster Poisson input process with heavy and light-tailed file sizes.
Vicky Fasen
Published in:
Queueing Syst. Theory Appl. (2010)
Keyphrases
</>
network traffic
intrusion detection
computer networks
intrusion detection system
long range dependence
anomaly detection
databases
network security
network bandwidth
malicious code
clustering algorithm
image segmentation
network intrusion detection
traffic volume