Login / Signup

Traffic Modeling with Bernoulli Shift Map.

Fei GeLiansheng TanYuan-ni Wang
Published in: NCM (2009)
Keyphrases
  • real time
  • network traffic
  • real valued
  • modeling method
  • database
  • maximum a posteriori
  • website
  • intrusion detection