-
1
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
December
-
Kim H, Claffy KC, Fomenkov M, Barman D, Faloutsos M, Lee KY. Internet traffic classification demystified: myths, caveats, and the best practices. In ACM CoNEXT 2008, December 2008.
-
(2008)
ACM CoNEXT 2008
-
-
Kim, H.1
Claffy, K.C.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.Y.6
-
2
-
-
38049121051
-
Early recognition of encrypted applications
-
April
-
Bernaille L, Teixeira R. Early recognition of encrypted applications. In PAM 2007, April 2007;165-175.
-
(2007)
PAM 2007
, pp. 165-175
-
-
Bernaille, L.1
Teixeira, R.2
-
3
-
-
33244467936
-
Internet traffic classification using Bayesian analysis techniques
-
June
-
Moore AW, Zuev D. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS 05, June 2005;50-60.
-
(2005)
ACM SIGMETRICS 05
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
4
-
-
37249023319
-
A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
-
Sadoddin R, Ghorbani AA. A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. In MLDM 07, 2007;404-418.
-
(2007)
MLDM 07
, pp. 404-418
-
-
Sadoddin, R.1
Ghorbani, A.A.2
-
5
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic A, Ozgur A, Ertoz L, Srivastava J, Kumar V. A comparative study of anomaly detection schemes in network intrusion detection. In SIAM 03, 2003.
-
(2003)
SIAM 03
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
11
-
-
49749084901
-
Heuristics to classify internet backbone traffic based on connection patterns
-
January
-
John W, Tafvelin S. Heuristics to classify Internet backbone traffic based on connection patterns. In ICOIN 08, January 2008.
-
(2008)
ICOIN 08
-
-
John, W.1
Tafvelin, S.2
-
13
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
April
-
Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K. Seven years and one day: sketching the evolution of Internet traffic. In IEEE INFOCOM 2009, April 2009;711-719.
-
(2009)
IEEE INFOCOM 2009
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
14
-
-
60949108379
-
Passive network forensics: Behavioural classification of network hosts based on connection patterns
-
McHugh J, McLeod R, Nagaonkar V. Passive network forensics: behavioural classification of network hosts based on connection patterns. ACM SIGOPS Operating Systems Review 2008;42(3):99-111.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.3
, pp. 99-111
-
-
McHugh, J.1
McLeod, R.2
Nagaonkar, V.3
-
15
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
Xu K, Zhang Z-L, Bhattacharyya S. Profiling Internet backbone traffic: behavior models and applications. In ACM SIGCOMM 05, 2005;169-180.
-
(2005)
ACM SIGCOMM 05
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
17
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
August
-
Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In ACM SIGCOMM 05, August 2005;217-228.
-
(2005)
ACM SIGCOMM 05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
70350473045
-
Analysis of internet backbone traffic and header anomalies observed
-
October
-
John W, Tafvelin S. Analysis of Internet backbone traffic and header anomalies observed. In ACM IMC 07, October 2007.
-
(2007)
ACM IMC 07
-
-
John, W.1
Tafvelin, S.2
-
19
-
-
67649458219
-
Application classification using packet size distribution and port association
-
Lin Y-D, Lu C-N, Lai Y-C, Peng W-H, Lin P-C. Application classification using packet size distribution and port association. Journal of Network and Computer Applications 2009;32:1023-1030.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 1023-1030
-
-
Lin, Y.-D.1
Lu, C.-N.2
Lai, Y.-C.3
Peng, W.-H.4
Lin, P.-C.5
-
20
-
-
70349658648
-
Tracking cardinality distributions in network traffic
-
April
-
Chen A, Li LE, Cao J. Tracking cardinality distributions in network traffic. In IEEE INFOCOM 2009, April 2009;819-827.
-
(2009)
IEEE INFOCOM 2009
, pp. 819-827
-
-
Chen, A.1
Li, L.E.2
Cao, J.3
-
21
-
-
33845633068
-
Sketch guided sampling: Using on-line estimates of flow size for adaptive data collection
-
April
-
Kumar A, Xu J. Sketch guided sampling: using on-line estimates of flow size for adaptive data collection. In IEEE INFOCOM 2006, April 2006.
-
(2006)
IEEE INFOCOM 2006
-
-
Kumar, A.1
Xu, J.2
-
23
-
-
0002726668
-
On the history of the minimum spanning tree problem
-
Graham RL, Hell P. On the history of the minimum spanning tree problem. Annals of the History of Computing 1985;7(1):43-57.
-
(1985)
Annals of the History of Computing
, vol.7
, Issue.1
, pp. 43-57
-
-
Graham, R.L.1
Hell, P.2
-
25
-
-
77950928696
-
Combining multiple partitions created with a graph-based construction for data clustering
-
September
-
Galluccio L, Michel O, Comon P, Hero AO, Kliger M. Combining multiple partitions created with a graph-based construction for data clustering. In IEEE International Workshop on Machine Learning for Signal Processing, September 2009.
-
(2009)
IEEE International Workshop on Machine Learning for Signal Processing
-
-
Galluccio, L.1
Michel, O.2
Comon, P.3
Hero, A.O.4
Kliger, M.5
-
26
-
-
0033184661
-
Theory of greedy approximations to minimal k-point random graphs
-
Hero AO, Michel O. theory of greedy approximations to minimal k-point random graphs. IEEE Transactions on Information Theory 1999;45:1921-1939.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 1921-1939
-
-
Hero, A.O.1
Michel, O.2
-
27
-
-
77956385176
-
Entropie conditionnelle de Rènyi et segmentation
-
Toulouse, France
-
Michel O, Flandrin P, Hero AO. Entropie conditionnelle de Rènyi et segmentation. In Proceedings of the Colloque GRETSI, Toulouse, France, 2001;665-668.
-
(2001)
Proceedings of the Colloque GRETSI
, pp. 665-668
-
-
Michel, O.1
Flandrin, P.2
Hero, A.O.3
-
28
-
-
67349225775
-
Some properties of rènyi entropy and rènyi entropy rate
-
Golshani L, Pasha E, Yari G. Some properties of Rènyi entropy and Rènyi entropy rate. Information Sciences 2009;179:2426-2433.
-
(2009)
Information Sciences
, vol.179
, pp. 2426-2433
-
-
Golshani, L.1
Pasha, E.2
Yari, G.3
-
29
-
-
0043130613
-
Identification of regulatory binding sites using minimum spanning trees
-
Lihue, HI
-
Olman V, Xu D, Xu Y. Identification of regulatory binding sites using minimum spanning trees. In Proceedings of the 8th Pacific Symposium on Biocomputing, Vol. 3, Lihue, HI, 2003;327-338.
-
(2003)
Proceedings of the 8th Pacific Symposium on Biocomputing
, vol.3
, pp. 327-338
-
-
Olman, V.1
Xu, D.2
Xu, Y.3
-
31
-
-
33746476985
-
Diffusion maps and coarse-graining: A unified framework for dimensionality reduction, graph partitioning and data set parameterization
-
Lafon S, Lee AB. Diffusion maps and coarse-graining: a unified framework for dimensionality reduction, graph partitioning and data set parameterization. IEEE Transactions on Pattern Analysis and Machine Intelligence 2006;28(9):1393-1403.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.9
, pp. 1393-1403
-
-
Lafon, S.1
Lee, A.B.2
-
32
-
-
77956391797
-
Initialization free graph based clustering
-
Laboratoire I3S, CNRS, Universitè de Nice-Sophia Antipolis, France
-
Galluccio L, Michel O, Comon P, Slezak E, Hero AO. Initialization free graph based clustering. Tech. Rep. I3S/RR-2009-08-FR, Laboratoire I3S, CNRS, Universitè de Nice-Sophia Antipolis, France, 2009.
-
(2009)
Tech. Rep. I3S/RR-2009-08-FR
-
-
Galluccio, L.1
Michel, O.2
Comon, P.3
Slezak, E.4
Hero, A.O.5
-
34
-
-
62949129764
-
Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure
-
August
-
Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure. In ACM SIGCOMM LSAD 07, August 2007;145-152.
-
(2007)
ACM SIGCOMM LSAD 07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
35
-
-
77956370129
-
-
Akerman R. 2007. Ports for Internet services. Available:, 17 July
-
Akerman R. 2007. Ports for Internet services. Available: http://www.chebucto.ns.ca/~rakerman/porttable.html [17 July 2020].
-
(2020)
-
-
-
36
-
-
18144414978
-
Is P2P dying or just hiding?
-
November-December
-
Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding? In IEEE GLOBECOM 04, November-December 2004;1532-1538.
-
(2004)
IEEE GLOBECOM 04
, pp. 1532-1538
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.C.4
Faloutsos, M.5
|