Login / Signup
Fuzzy logic based modelling and analysis of network traffic.
Abul Rahman
Paul J. Kennedy
Andy Simmonds
Jenny Edwards
Published in:
CIT (2008)
Keyphrases
</>
network traffic
anomaly detection
intrusion detection
computer networks
network bandwidth
real world
learning algorithm
network security
long range