Skip to content

O.2.1. Evaluate algorithms in existing research literature to identify network anomalies then choose appropriate strategies to implement.

We want to make a review of the literature of algorithms to identify network anomalies and select a few strategies to implement and test.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information