[1]
R. Ciplinskas and N. Paulauskas, “Outlier detection method use for the network flow anomaly detection ”, MLA, vol. 8, no. 3, pp. 327–333, Jun. 2016, doi: 10.3846/mla.2016.928.