Computer Science ›› 2005, Vol. 32 ›› Issue (8): 37-39.

Previous Articles     Next Articles

Tu XuPing;Jin Hai;He LiLi;Yang ZhiLing;Tao ZhiFei   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The main methods to detect anomaly network flow are through comparison between the system's actual action pattern and normal action pattern. There is a trade-off between real-time and veracity in anomaly network flow detection, this paper presents a new m

Key words: Flow detect, Anomaly detect, Measure coefficient

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!