"tcp signatures"

Mining Workflows for Anomalous Data Transfers