Login / Signup

A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis.

Lingzi KongDaoqi HanJunmei DingMingrui FanYueming Lu
Published in: DSC (2022)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • internet traffic
  • object recognition
  • traffic data
  • computer networks
  • feature extraction
  • ip addresses
  • intrusion detection
  • data mining techniques
  • network structure