Login / Signup
Application Identification of Network Traffic by Reservoir Computing.
Toshiyuki Yamane
Jean Benoit Héroux
Hidetoshi Numata
Gouhei Tanaka
Ryosho Nakane
Akira Hirose
Published in:
ICONIP (5) (2019)
Keyphrases
</>
network traffic
intrusion detection
anomaly detection
network security
traffic analysis
network management
reservoir computing
internet traffic
network bandwidth
network intrusion detection
databases
computer networks
network monitoring
feature selection
data mining
traffic volume
detecting anomalous