Investigating application behavior in network traffic traces

Vahid Aghaei Foroushani, A. Nur Zincir-Heywood

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
Original languageEnglish
Title of host publicationProceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
Pages72-79
Number of pages8
DOIs
Publication statusPublished - 2013
Event2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013 - Singapore, Singapore
Duration: Apr 16 2013Apr 19 2013

Publication series

NameProceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013

Conference

Conference2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
Country/TerritorySingapore
CitySingapore
Period4/16/134/19/13

ASJC Scopus Subject Areas

  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Investigating application behavior in network traffic traces'. Together they form a unique fingerprint.

Cite this