Login / Signup

Detecting anomalies in network traffic using the method of remaining elements.

Pablo Velarde-AlvaradoCésar Vargas RosalesDeni Torres RománAlberto F. Martínez-Herrera
Published in: IEEE Commun. Lett. (2009)
Keyphrases
  • network traffic
  • anomaly detection
  • intrusion detection
  • probabilistic model
  • detecting anomalies
  • metadata
  • data streams
  • network intrusion detection