Login / Signup
Investigating application behavior in network traffic traces.
Vahid Aghaei Foroushani
A. Nur Zincir-Heywood
Published in:
CISDA (2013)
Keyphrases
</>
network traffic
anomaly detection
intrusion detection
computer networks
network security
traffic data
traffic patterns
information systems
intrusion detection system
traffic analysis
data mining
data analysis
network bandwidth
traffic engineering
malicious code
detecting anomalous