Login / Signup
Misuse patterns in VoIP.
Juan C. Pelaez
Eduardo B. Fernández
María M. Larrondo-Petrie
Published in:
Secur. Commun. Networks (2009)
Keyphrases
</>
anomaly detection
quality of service
pattern mining
countermeasures
similar patterns
machine learning
knowledge base
spatio temporal
frequent patterns
sequential patterns
intrusion detection system
pattern analysis
packet loss