Login / Signup

Filtration model for the detection of malicious traffic in large-scale networks.

Abdulghani Ali AhmedAman JantanTat Chee Wan
Published in: Comput. Commun. (2016)
Keyphrases
  • data mining
  • data structure
  • real time
  • anomaly detection
  • intrusion detection
  • false positives