For example,Бобцов

THREATS AND ANOMALIES DETECTION USING MODERN COMPUTER NETWORK MONITORING TECHNIQUES

Annotation

Modern techniques for telecommunications network traffic analysis and their highs and lows are discussed in the paper. Threats and intrusion detection model is proposed that is based on security indices forecasts and forecasts comparison with normal profile for particular network.

Читать текст статьи

Keywords

Articles in current issue