Sign in

An investigation into teredo and 6to4 transition mechanisms: Traffic analysis.

Martin ElichPetr VelanTomás JirsíkPavel Celeda
Published in: LCN Workshops (2013)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • internet traffic
  • traffic data
  • real world
  • data management
  • unsupervised learning
  • anomaly detection
  • intrusion detection system
  • computer networks