Research Article
Detecting Persistent User Behavior Using Probabilistic Counting in Network-Wide View
| | Input: initialize Bi, 1 ≤ i ≤ r | | | Output: the updated Bi, 1 ≤ i ≤ r | | (1) | for each timeslot t do | | (2) | for each packet do | | (3) | vextract user ID u | | (4) | compute , 1 ≤ j ≤ k | | (5) | compute , 1 ≤ j ≤ k | | (6) | set the bit of Bi to one | | (7) | end for | | (8) | end for |
|