Login / Signup
An orchestration approach for unwanted Internet traffic identification.
Eduardo Feitosa
Eduardo Souto
Djamel Fawzi Hadj Sadok
Published in:
Comput. Networks (2012)
Keyphrases
</>
internet traffic
network traffic
traffic analysis
internet service providers
machine learning
web services
active learning
file sharing