Login / Signup
Using Machine Learning Techniques to Identify Botnet Traffic.
Carl Livadas
Robert Walsh
David E. Lapsley
W. Timothy Strayer
Published in:
LCN (2006)
Keyphrases
</>
network traffic
traffic data
denial of service attacks
traffic volume
ddos attacks
road network
end to end
peer to peer
image sequences
e learning
information systems
databases
traffic accidents
traffic patterns
real time
high priority
database