• Citations Per Year
Learn More
Flow classification techniques can be applied to network and end-host security, e.g., a flow whose destination port number indicates one application type, but whose features reflect another, is an anomaly that may indicate malicious activity. Also, network planners may wish to digest [7],[31] the types and quantities of packet-flows they handle in order to(More)
  • 1