메뉴 건너뛰기




Volumn 6155 LNCS, Issue , 2010, Pages 167-170

Cybermetrics: User identification through network flow analysis

Author keywords

Cybermetrics; Network Flow Analysis; User Identification

Indexed keywords

ACTIVITY CYCLES; CYBERMETRICS; INTERNET ACTIVITY; KEYSTROKE DYNAMICS; NETWORK DOMAINS; NETWORK FLOWS; ON-LINE GAMES; USER IDENTIFICATION; BIOMETRIC PATTERNS; NETWORK FLOW ANALYSIS;

EID: 77954869647     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13986-4_24     Document Type: Conference Paper
Times cited : (13)

References (8)
  • 6
    • 43949093547 scopus 로고    scopus 로고
    • Identification and analysis of peer-to-peer traffic
    • Peŕenyi, M., Dang, T.D., Gefferth, A., Molńar, S.: Identification and analysis of peer-to-peer traffic. JCM 1(7), 36-46 (2006)
    • (2006) JCM , vol.1 , Issue.7 , pp. 36-46
    • Peŕenyi, M.1    Dang, T.D.2    Gefferth, A.3    Molńar, S.4
  • 8
    • 43949111011 scopus 로고    scopus 로고
    • A two-layered anomaly detection technique based on multi-modal flow behavior models
    • Claypool, M., Uhlig, S. (eds.) PAM 2008. Springer, Heidelberg
    • Stoecklin, M.P., Boudec, J.-Y.L., Kind, A.: A two-layered anomaly detection technique based on multi-modal flow behavior models. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol.4979, pp. 212-221. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4979 , pp. 212-221
    • Stoecklin, M.P.1    Boudec, J.-Y.L.2    Kind, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.