-
1
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Aug
-
G. Giacinto, F. Roli, L. Didaci, "Fusion of multiple classifiers for intrusion detection in computer networks," Pattern Recognition Lett., Vol. 24, no. 12, pp. 1795-1803, Aug. 2003.
-
(2003)
Pattern Recognition Lett
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
2
-
-
50949094133
-
An HMM Approach to Internet Traffic Modeling
-
Dec
-
A. Dainotti, A. Pescape, P. Salvo Rossi, G. Iannello, G. Ventre, F. Palmieri, "An HMM Approach to Internet Traffic Modeling," IEEE Global Telecommun. Conf. (GLOBECOM), pp. 1-6, Dec. 2006.
-
(2006)
IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Dainotti, A.1
Pescape, A.2
Salvo Rossi, P.3
Iannello, G.4
Ventre, G.5
Palmieri, F.6
-
3
-
-
84868972686
-
-
http://www.net-security.org/secworld.php?id=4852, Mar. 2008.
-
(2008)
-
-
Mar1
-
4
-
-
18144414978
-
Is P2P dying or just hiding?
-
Dec
-
T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, "Is P2P dying or just hiding?," IEEE Global Telecommun. Conf. (GLOBECOM), pp. 1532-1538, Dec. 2004.
-
(2004)
IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1532-1538
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.C.4
Faloutsos, M.5
-
5
-
-
33751393658
-
Automated traffic classification and application identification using machine learning
-
Nov
-
S. Zander, T. Nguyen, G. Armitage, "Automated traffic classification and application identification using machine learning," IEEE LCN, pp. 250-257, Nov. 2005.
-
(2005)
IEEE LCN
, pp. 250-257
-
-
Zander, S.1
Nguyen, T.2
Armitage, G.3
-
6
-
-
42549110598
-
A Statistical Approach to IP-level classification of network traffic
-
Jun
-
M. Crotti, F. Gringoli, P. Pelosato, L. Salgarelli, "A Statistical Approach to IP-level classification of network traffic," IEEE Int. Conf. Commun. (ICC), pp. 170-176, Jun. 2006.
-
(2006)
IEEE Int. Conf. Commun. (ICC)
, pp. 170-176
-
-
Crotti, M.1
Gringoli, F.2
Pelosato, P.3
Salgarelli, L.4
-
7
-
-
50949098638
-
Internet Traffic Identification using Machine Learning
-
Dec
-
J. Erman, A. Mahanti, M. Arlitt, "Internet Traffic Identification using Machine Learning," IEEE Global Telecommun. Conf. (GLOBECOM), pp. 1-6, Dec. 2006.
-
(2006)
IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
-
9
-
-
33846098197
-
Bayesian Neural Networks for Internet Traffic Classification
-
Jan
-
T. Auld, A.W. Moore, S.F. Gull, "Bayesian Neural Networks for Internet Traffic Classification," IEEE Trans. Neural Networks, Vol. 18, no. 1, pp. 223-239, Jan. 2007.
-
(2007)
IEEE Trans. Neural Networks
, vol.18
, Issue.1
, pp. 223-239
-
-
Auld, T.1
Moore, A.W.2
Gull, S.F.3
-
10
-
-
20444441611
-
HMM Profiles for Network Traffic Classification
-
Oct
-
C. Wright, F. Monrose, G. Masson, "HMM Profiles for Network Traffic Classification", VizSEC/DMSEC, pp. 9-15, Oct. 2004.
-
(2004)
VizSEC/DMSEC
, pp. 9-15
-
-
Wright, C.1
Monrose, F.2
Masson, G.3
-
11
-
-
33748075208
-
Towards better protocol identification using profile HMMs
-
JHU-SPAR051201, Jun. 2005
-
C. Wright, F. Monrose, G. Masson, "Towards better protocol identification using profile HMMs", JHU Tech. Rep. JHU-SPAR051201, Jun. 2005.
-
JHU Tech. Rep
-
-
Wright, C.1
Monrose, F.2
Masson, G.3
-
12
-
-
0024610919
-
A tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
Feb
-
L.R. Rabiner, "A tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Procs. IEEE, Vol. 77, no. 2, pp. 257-285, Feb. 1989.
-
(1989)
Procs. IEEE
, vol.77
, Issue.2
, pp. 257-285
-
-
Rabiner, L.R.1
-
13
-
-
84868972715
-
-
http://www.comscore.com/, Sep. 2007.
-
(2007)
-
-
Sep1
-
14
-
-
84868970537
-
-
http://join.msn.com/messenger/overview, Sep. 2007.
-
(2007)
-
-
Sep1
-
15
-
-
84868962604
-
-
http://sourceforge.net/projects/pdonkey/, Mar. 2008.
-
(2008)
-
-
Mar1
-
16
-
-
84868962609
-
-
http://www.microsoft.com/games/ageofmythology/, Mar. 2008.
-
(2008)
-
-
Mar1
-
17
-
-
84868963237
-
-
http://www.counter-strike.net/, Mar. 2008,
-
(2008)
-
-
Mar1
-
18
-
-
84868972710
-
-
http://nile.wpi.edu/downloads, Sep. 2007.
-
(2007)
-
-
Sep1
-
19
-
-
23344442945
-
A Traffic Characterization of Popular On-line Games
-
Jun
-
W. Feng, F. Chang, W. Feng, J. Walpole, "A Traffic Characterization of Popular On-line Games," IEEE/ACM Trans. Networking, Vol. 13, no. 3, pp. 488-500, Jun. 2005.
-
(2005)
IEEE/ACM Trans. Networking
, vol.13
, Issue.3
, pp. 488-500
-
-
Feng, W.1
Chang, F.2
Feng, W.3
Walpole, J.4
-
21
-
-
84868970534
-
-
http://www.microsoft.com/technet/prodtechnol/isa/2 000/maintain/isaimsec. mspx, Sep. 2007.
-
(2007)
-
-
Sep1
-
22
-
-
84868972711
-
-
http://www.hypothetic.org/docs/msn/general/overview.php, Sep. 2007.
-
(2007)
-
-
Sep1
-
23
-
-
70450037559
-
Lightweight Application Classification for Network Management
-
SIGCOMM Work. Internet Network Manag, Aug
-
H. Jiang, A.W. Moore, Z. Ge, S. Jin, J. Wang, "Lightweight Application Classification for Network Management," SIGCOMM Work. Internet Network Manag., Aug. 2007.
-
(2007)
-
-
Jiang, H.1
Moore, A.W.2
Ge, Z.3
Jin, S.4
Wang, J.5
-
24
-
-
34250352679
-
-
Information Manag. & Computer Security J, Jun
-
O. Marques, P. Baillargeon, "Design of a multimedia traffic classifier for Snort," Information Manag. & Computer Security J., Vol. 15, no. 2, Jun. 2007.
-
(2007)
Design of a multimedia traffic classifier for Snort
, vol.15
, Issue.2
-
-
Marques, O.1
Baillargeon, P.2
|