If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (firstname.lastname@example.org)
Now showing items 1-1 of 1
Network Security Monitoring and Analysis based on Big Data Technologies
Network flow data provide valuable information to understand the network state and to be aware of the network security threats. However, processing the large amount of data collected from the network and providing real ...