-
3
-
-
85167537865
-
-
Trojan Now Uses Hotmail, Gmail as Spam Hosts. http://news.bitdefender. com/NW544-en-n-\-Trojan-Now-Uses-Hotmail-as-Spam-Hosts.html, 2007.
-
(2007)
Gmail As Spam Hosts
-
-
-
5
-
-
35348837600
-
Content-aware internet application traffic measurement and analysis
-
T. Choi, C. Kim, S. Yoon, J. Park, B. Lee, H. Kim, and H. Chung. Content-Aware Internet Application Traffic Measurement and Analysis. In Proc. of IEEE/IFIP NOMS, 2005.
-
(2005)
Proc. of IEEE/IFIP NOMS
-
-
Choi, T.1
Kim, C.2
Yoon, S.3
Park, J.4
Lee, B.5
Kim, H.6
Chung, H.7
-
8
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In Proc. of USENIX Security Symposium, 2006.
-
(2006)
Proc. of USENIX Security Symposium
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
10
-
-
85041447270
-
Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine
-
S. Hao, N. Feamster, A. Gray, N. Syed, and S. Krasser. Detecting Spammers with SNARE: Spatio-Temporal Network-level Automatic Reputation Engine. In Proc. of USENIX Security Symposium, 2009.
-
(2009)
Proc. of USENIX Security Symposium
-
-
Hao, S.1
Feamster, N.2
Gray, A.3
Syed, N.4
Krasser, S.5
-
11
-
-
85167539196
-
-
The Horde Project. www.horde.org.
-
-
-
-
13
-
-
70349686731
-
Network monitoring using traffic dispersion graphs
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, and G. Varghese. Network Monitoring Using Traffic Dispersion Graphs. In Proc. of ACM IMC, 2007.
-
(2007)
Proc. of ACM IMC
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Varghese, G.5
-
16
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. In Proc. of ACM CoNEXT, 2008.
-
(2008)
Proc. of ACM CoNEXT
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
17
-
-
85167534126
-
Comparison of internet traffic classification tools
-
H. Kim, M. Fomenkov, K. Claffy, N. Brownlee, D. Barman, and M. Faloutsos. Comparison of Internet Traffic Classification Tools. In Proc. of IMRG workshop on application classification and identification report, 2009.
-
(2009)
Proc. of IMRG Workshop on Application Classification and Identification Report
-
-
Kim, H.1
Fomenkov, M.2
Claffy, K.3
Brownlee, N.4
Barman, D.5
Faloutsos, M.6
-
22
-
-
14344265818
-
Internet traffic classification using bayesian analysis techniques
-
A. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In Proc. of ACM SIGMETRICS, 2005.
-
(2005)
Proc. of ACM SIGMETRICS
-
-
Moore, A.1
Zuev, D.2
-
23
-
-
33845234542
-
Toward the accurate identification of network applications
-
A. W. Moore and P. Konstantina. Toward the Accurate Identification of Network Applications. In Proc. of PAM, 2005.
-
(2005)
Proc. of PAM
-
-
Moore, A.W.1
Konstantina, P.2
-
27
-
-
14944383480
-
Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification
-
M. Roughan, S. Sen, O. Spatschek, and N. Duffield. Class-of-Service Mapping for QoS: a Statistical Signature-Based Approach to IP Traffic Classification. In Proc. of ACM IMC, 2004.
-
(2004)
Proc. of ACM IMC
-
-
Roughan, M.1
Sen, S.2
Spatschek, O.3
Duffield, N.4
-
30
-
-
19944406146
-
Accurate, scalable in-network identification of P2P traffic using application signatures
-
S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In Proc. of WWW, 2004.
-
(2004)
Proc. of WWW
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
|