Login / Signup

Fuzzy logic based modelling and analysis of network traffic.

Abul RahmanPaul J. KennedyAndy SimmondsJenny Edwards
Published in: CIT (2008)
Keyphrases
  • network traffic
  • anomaly detection
  • intrusion detection
  • computer networks
  • network bandwidth
  • real world
  • learning algorithm
  • network security
  • long range