If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (firstname.lastname@example.org). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-1 of 1
Network Security Monitoring and Analysis based on Big Data Technologies
Network flow data provides valuable information to understand the network status and tobe aware of the network security threads. However, handling the large amount of datacollected from the network and providing real time ...