2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS) 2014
DOI: 10.1109/icspcs.2014.7021098
|View full text |Cite
|
Sign up to set email alerts
|

Systematic downloading: Analysis and detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…It logs the details of all the requests from the client. User access pattern for the subscribed content, which is available in the logs, can be used to train models for detection of systematic downloading (Bhandari et al 2014). For this task, Normal and Systematic download traffic request are analysed as mentioned below.…”
Section: 3a Datasetmentioning
confidence: 99%
“…It logs the details of all the requests from the client. User access pattern for the subscribed content, which is available in the logs, can be used to train models for detection of systematic downloading (Bhandari et al 2014). For this task, Normal and Systematic download traffic request are analysed as mentioned below.…”
Section: 3a Datasetmentioning
confidence: 99%