Login / Signup
Characterizing per-application network traffic using entropy.
Vladislav Petkov
Ram Rajagopal
Katia Obraczka
Published in:
ACM Trans. Model. Comput. Simul. (2013)
Keyphrases
</>
network traffic
anomaly detection
intrusion detection
intrusion detection system
computer networks
network security
network bandwidth
network intrusion detection
network monitoring
traffic analysis
real world
pairwise
active learning
traffic volume
detecting anomalous