Login / Signup
Protecting bursty applications against traffic aggressiveness.
Anat Bremler-Barr
Nir Halachmi
Hanoch Levy
Published in:
Comput. Networks (2007)
Keyphrases
</>
network traffic
traffic volume
traffic flow
internet traffic
road traffic
anomaly detection
intrusion detection
traffic data
traffic control
access control
atm networks
urban traffic
database
real time
information systems
case study