Keyphrases
- network traffic
- anomaly detection
- intrusion detection
- learning algorithm
- detecting anomalous
- detect anomalies
- network security
- intrusion detection system
- network intrusion detection
- computer networks
- false alarms
- data processing
- data management
- response time
- traffic patterns
- object recognition
- traffic volume
- machine learning
- long range dependence