Research Article

Detecting Anomalous LAN Activities under Differential Privacy

Algorithm 3

Naïve- Approach.
Input: , , ,
Output:
(1)
(2)for to do
(3)
(4)
(5)ifthen
(6)else
(7)end