Rohani, M. F., Maarof, M. A., Selamat, A., & Kettani, H. (2007). Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model. International Journal of Computer Science and Network Security.
Chicago Style (17th ed.) CitationRohani, M. F., M. A. Maarof, A. Selamat, and H. Kettani. Uncovering Anomaly Traffic Based on Loss of Self-similarity Behavior Using Second Order Statistical Model. International Journal of Computer Science and Network Security, 2007.
MLA (9th ed.) CitationRohani, M. F., et al. Uncovering Anomaly Traffic Based on Loss of Self-similarity Behavior Using Second Order Statistical Model. International Journal of Computer Science and Network Security, 2007.
Warning: These citations may not always be 100% accurate.