Laxmi Sunkara

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Most recent research shows that network intrusion traffic types can be represented by concentric unit circles while network protocols such as http and https can be represented by rectangles. These geometric properties can be used to develop signatures which can be applied to classify different types of network traffic. Discovering these signatures can be(More)
  • 1