Research Article

Detecting Anomalous LAN Activities under Differential Privacy

Algorithm 2

Histogram-based Approach.
Input: , ,
Output:
(1)for to do
(2)
(3)foreachdo
(4)  
(5)  ifthen
  
(6)  else
(7)end
(8)end