Y Ling, M Rosti, G Swanson - 2016 IEEE Systems and …, 2016 - ieeexplore.ieee.org
Networks are inherently vulnerable to attack and we need dynamic detection methods to find
the evergrowing number and types of attacks. We assume that the access pattern of an …