Sign in

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.

Oscar EsparzaMiguel SorianoJose L. MuñozJordi Forné
Published in: MATA (2003)
Keyphrases
  • network traffic
  • automatic detection
  • real time
  • neural network
  • lightweight
  • authentication protocol