Login / Signup

A self-tuning self-optimizing approach for automated network anomaly detection systems.

Dennis IppolitiXiaobo Zhou
Published in: ICAC (2012)
Keyphrases
  • network anomaly detection
  • distributed systems
  • computer systems
  • databases
  • face recognition
  • response time
  • anomaly detection