Protecting Bursty Applications Against Traffic Aggressiveness.
Anat Bremler-BarrHanoch LevyNir HalachmiPublished in: IWQoS (2006)
Keyphrases
- network traffic
- traffic flow
- traffic data
- traffic patterns
- internet traffic
- intrusion detection
- road network
- traffic congestion
- traffic volume
- traffic control
- anomaly detection
- real time
- network resources
- network management
- transportation networks
- traffic monitoring
- flow control
- heavy tailed
- access control
- data sets
- traffic load
- intermediate nodes