A power laws-based reconstruction approach to end-to-end network traffic.
Laisen NieDingde JiangLei GuoPublished in: J. Netw. Comput. Appl. (2013)
Keyphrases
- end to end
- network traffic
- power laws
- intrusion detection
- anomaly detection
- network monitoring
- traffic data
- network security
- network management
- computer networks
- power law
- internet traffic
- network bandwidth
- traffic analysis
- power law distribution
- network resources
- ad hoc networks
- intrusion detection system
- reinforcement learning
- average degree
- connected components
- cellular automata
- real world graphs
- response time