Ask a Question

Prefer a chat interface with context about you and your work?

Detecting Weak Dependence in Computer Network Traffic Patterns by Using Higher Criticism

Detecting Weak Dependence in Computer Network Traffic Patterns by Using Higher Criticism

Summary To perform robust statistical anomaly detection in cybersecurity, we must build realistic models of the traffic patterns within a computer network. It is therefore important to understand the dependences between the large number of routinely interacting communication pathways within such a network. Pairs of interacting nodes in any directed …