-
1
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31(23-24), pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
2
-
-
18144414978
-
Is P2P dying or just hiding?
-
T. Karagiannis, A. Broido, N. Brownlee, and K. Claffy, "Is P2P dying or just hiding?" in Proceedings of Globecom 2004, Dallas, Texas, USA, November/December 2004.
-
Proceedings of Globecom 2004, Dallas, Texas, USA, November/December 2004
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.4
-
3
-
-
84860496498
-
Accurate, scalable in network identification of P2P traffic using application signatures
-
S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in network identification of P2P traffic using application signatures," in WWW2004, New York, NY, USA, May 2004.
-
WWW2004, New York, NY, USA, May 2004
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
4
-
-
84869166587
-
Internet traffic classification using Bayesian analysis techniques
-
A. Moore and D. Zuev, "Internet traffic classification using Bayesian analysis techniques," in Proc. of ACM SIGMETRICS 2005, Banff, Alberta, Canada, June 2005.
-
Proc. of ACM SIGMETRICS 2005, Banff, Alberta, Canada, June 2005
-
-
Moore, A.1
Zuev, D.2
-
5
-
-
70449463526
-
Using GMM and SVM-based Techniques for the Classification of SSH-Encrypted Traffic
-
M. Dusi, A. Este, F. Gringoli, and L. Salgarelli, "Using GMM and SVM-based Techniques for the Classification of SSH-Encrypted Traffic," The 2009 IEEE International Conference on Communications, Dresden, June 14-18, 2009.
-
The 2009 IEEE International Conference on Communications, Dresden, June 14-18, 2009
-
-
Dusi, M.1
Este, A.2
Gringoli, F.3
Salgarelli, L.4
-
6
-
-
62849120844
-
A survey of techniques for Internet traffic classification using machine laerning
-
T. Nguyen, G. Armitage. "A survey of techniques for Internet traffic classification using machine laerning," IEEE Communications Surveys and Tutorials, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
-
-
Nguyen, T.1
Armitage, G.2
-
7
-
-
29244451861
-
ACAS: Automated Construction of Application Signatures
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "ACAS: Automated Construction of Application Signatures," in SIGCOMM'05 Workshops, Philadelphia, USA, August 22-26, 2005.
-
SIGCOMM'05 Workshops, Philadelphia, USA, August 22-26, 2005
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
8
-
-
85164893009
-
Flow clustering using machine learning techniques
-
A. McGregor, M. Hall, P. Lorier, and J. Brunskill, "Flow clustering using machine learning techniques," in Proc. of PAM2004, Antibes Juan-les-Pins, France, April 2004.
-
Proc. of PAM2004, Antibes Juan-les-Pins, France, April 2004
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
9
-
-
33750283653
-
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
-
N. Williams, S. Zander, and G. Armitage, "A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification," SIGCOMM Computer Communication Review, vol. 36, no.5, pp.5-16, 2006.
-
(2006)
SIGCOMM Computer Communication Review
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
|