Login / Signup
Identification of User Application by an External Eavesdropper using Machine Learning Analysis on Network Traffic.
Sina Fathi Kazerooni
Yagiz Kaymak
Roberto Rojas-Cessa
Published in:
ICC Workshops (2019)
Keyphrases
</>
network traffic
machine learning
intrusion detection
pattern recognition
anomaly detection
data mining
data analysis
intrusion detection system
network security
network intrusion detection
real world
information retrieval
response time
network management