Login / Signup

An Analysis of Anomalous User Agent Strings in Network Traffic.

Jie ChenGaopeng GouGang Xiong
Published in: HPCC/SmartCity/DSS (2019)
Keyphrases
  • network traffic
  • anomaly detection
  • detecting anomalous
  • intrusion detection
  • real world
  • computer networks
  • databases
  • intrusion detection system
  • network security
  • agent technology
  • traffic analysis