Login / Signup
Plug & execute framework for network traffic generation.
Uta Ziegler
Youssif B. Al-Nashif
Salim Hariri
Published in:
CSIIRW (2010)
Keyphrases
</>
network traffic
intrusion detection
anomaly detection
computer networks
network security
network intrusion detection
intrusion detection system
network management
traffic volume