[1]
R. Ciplinskas and N. Paulauskas, “Outlier detection method use for the network flow anomaly detection ”, MLA, vol. 8, no. 3, pp. 327-333, Jun. 2016.