Sign in

Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G Networks.

Shih-Ting ChiuFang-Yie Leu
Published in: NBiS (2020)
Keyphrases
  • ddos attacks
  • expectation maximization
  • social networks
  • probabilistic model
  • supply chain
  • unsupervised learning
  • cloud computing