-
1
-
-
33746582946
-
A first look at modern enterprise traffic
-
October
-
Allmanz M. et.al. A First Look at Modern Enterprise Traffic, In Proc. Internet Measurement Conference, October 2005, 217-231.
-
(2005)
Proc. Internet Measurement Conference
, pp. 217-231
-
-
Allmanz, M.1
-
2
-
-
18244405757
-
Personal email networks: An effective anti-spam tool
-
Boykin O., Roychowdhury V. Personal Email Networks: An Effective Anti-Spam Tool, IEEE Computer, Vol. 38, No. 4, (2005), 61-68.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
, pp. 61-68
-
-
Boykin, O.1
Roychowdhury, V.2
-
3
-
-
33847112108
-
Scale-free topology of e-mail networks
-
Ebel H., Mielsh L., Bornholdt S., Scale-free topology of e-mail networks. Physical Review E 66, 2002, 121-131.
-
(2002)
Physical Review E
, vol.66
, pp. 121-131
-
-
Ebel, H.1
Mielsh, L.2
Bornholdt, S.3
-
4
-
-
0033204106
-
On power-law relationships of the Internet topology
-
August
-
Faloutsos M., Faloutsos P., Faloutsos C., On power-law relationships of the Internet topology. In Proc.ACM SIGCOMM '99 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 1999, 251-262.
-
(1999)
Proc.ACM SIGCOMM '99 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
5
-
-
0141650502
-
Observed structure of addresses in IP traffic
-
November
-
Kohler E., Liy J., Paxson V., Shenker S., Observed Structure of Addresses in IP Traffic, In Proc. SIGCOMM Internet Measurement Workshop, November 2002, 253-266.
-
(2002)
Proc. SIGCOMM Internet Measurement Workshop
, pp. 253-266
-
-
Kohler, E.1
Liy, J.2
Paxson, V.3
Shenker, S.4
-
6
-
-
33745317862
-
A mobile agent approach to intrusion detection in network systems
-
(2005): Proceedings of KES 2005
-
Kolaczek G., Kuchtiak-Pieczynska A., Juszczyszyn K., Grzech A., Katarzynak R., Nguyen N.T. (2005): A Mobile Agent Approach to Intrusion Detection in Network Systems. In: Proceedings of KES 2005, Lecture Notes in Artificial Intelligence 3682 (2005) 514-519.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3682
, pp. 514-519
-
-
Kolaczek, G.1
Kuchtiak-Pieczynska, A.2
Juszczyszyn, K.3
Grzech, A.4
Katarzynak, R.5
Nguyen, N.T.6
-
7
-
-
0036850264
-
Consensus systems for conflict solving in distributed systems
-
Nguyen N.T.: Consensus systems for conflict solving in distributed systems. Information Sciences 147 (1-4) (2002) 91-122
-
(2002)
Information Sciences
, vol.147
, Issue.1-4
, pp. 91-122
-
-
Nguyen, N.T.1
-
8
-
-
35248845354
-
Multiscale modeling and simulation of worm effects on the internet routing infrastructure
-
Nicol D., Liljenstam M., Liu J., Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure, In Proc. Performance Tools Conference, 2003, 1-10.
-
(2003)
Proc. Performance Tools Conference
, pp. 1-10
-
-
Nicol, D.1
Liljenstam, M.2
Liu, J.3
-
9
-
-
21344482808
-
A storage model with self-similar input
-
Norros I., A storage model with self-similar input, Queueing Syst. 16 (1994) 387-396,.
-
(1994)
Queueing Syst.
, vol.16
, pp. 387-396
-
-
Norros, I.1
-
10
-
-
21844451952
-
Diot. C. diagnosing network-wide traffic anomalies
-
Portland
-
Lakhina A., Crovella M., Diot. C. Diagnosing Network-Wide Traffic Anomalies. In Proc. of ACM SIGCOMM 2004. Portland. (2004) 219-230.
-
(2004)
Proc. of ACM SIGCOMM 2004
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
|