作者: Ibrahim Ghafir , Vaclav Prenosil
DOI: 10.1109/GCCT.2015.7342657
关键词:
摘要: … traffic for malicious IPs detection. The method was set up to create a log file of detected malicious … and passively analyzing the campus live traffic. The monitoring was performed for one …