Login / Signup
Generalization of signatures for SSH encrypted traffic identification.
Riyad Alshammari
A. Nur Zincir-Heywood
Published in:
CICS (2009)
Keyphrases
</>
signature recognition
traffic flow
anomaly detection
network traffic
traffic control
website
data sets
genetic algorithm
response time
traffic management
traffic information
traffic volume
stepping stones