Protecting the application layer in the public domain with machine learning methods.
Rafal KozikMichal ChorasPublished in: Log. J. IGPL (2019)
Keyphrases
- machine learning methods
- application layer
- machine learning
- network layer
- end to end
- machine learning approaches
- machine learning algorithms
- video streaming
- physical layer
- bandwidth allocation
- ensemble methods
- cross layer
- learned knowledge
- access control
- overlay network
- transport layer
- ddos attacks
- statistical methods
- data mining
- real world