Login / Signup
Establishing broadband application signatures through ATM network traffic measurement analyses.
Judith L. Jerkins
Jonathan L. Wang
Published in:
ICC (1998)
Keyphrases
</>
network traffic
intrusion detection
anomaly detection
network intrusion detection
intrusion detection system
computer networks
detecting anomalous
network security
network management
network resources
information systems
wireless sensor networks
traffic volume
network traffic data
malicious traffic