First Page | Document Content | |
---|---|---|
![]() Date: 2002-10-29 14:04:58Computer network security Data analysis Anomaly detection Intrusion detection system Local outlier factor Network performance Misuse detection Robust random early detection Outlier Statistics Data security Data mining | Source URL: www.csee.umbc.eduDownload Document from Source WebsiteFile Size: 590,82 KBShare Document on Facebook |
![]() | Flow Rate Management and P2P ControlDocID: 1r9FN - View Document |
![]() | Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:DocID: 1qpRO - View Document |
![]() | Flow Rate Management and P2P ControlDocID: 1qfsO - View Document |
![]() | Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗DocID: 1q3S9 - View Document |
![]() | ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1DocID: 1pSMR - View Document |