Login / Signup
Modeling of captured network traffic by the mimic defragmentation process.
Matjaz Fras
Joze Mohorko
Zarko Cucej
Published in:
Simul. (2011)
Keyphrases
</>
network traffic
anomaly detection
long range dependence
computer networks
intrusion detection
data mining
active learning
network security
network management
network intrusion detection
information systems
intrusion detection system
network bandwidth
network monitoring
traffic volume