-
2
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
August
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications," in Proceedings of ACM SIGCOMM, August 2005.
-
(2005)
Proceedings of ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
3
-
-
78649491247
-
Network prefix-level traffic profiling: Characterizing, modeling, and evaluation
-
H. Jiang, Z. Ge, S. Jin, and J. Wang, "Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation," Computer Networks, 2010.
-
(2010)
Computer Networks
-
-
Jiang, H.1
Ge, Z.2
Jin, S.3
Wang, J.4
-
4
-
-
70449686700
-
Unveiling core networkwide communication patterns through application traffic activity graph decomposition
-
June
-
Y. Jin, E. Sharafuddin, and Z.-L. Zhang, "Unveiling core networkwide communication patterns through application traffic activity graph decomposition," in Proceedings of ACM SIGMETRICS, June 2009.
-
(2009)
Proceedings of ACM SIGMETRICS
-
-
Jin, Y.1
Sharafuddin, E.2
Zhang, Z.-L.3
-
6
-
-
42149143451
-
Network monitoring using traffic dispersion graphs
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network monitoring using traffic dispersion graphs," in Proceedings of ACM SIGCOMM Internet Measurement Conference, 2007.
-
(2007)
Proceedings of ACM SIGCOMM Internet Measurement Conference
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
7
-
-
33748715166
-
Bipartite graphs as models of complex networks
-
J.-L. Guillaume, and M. Latapy, "Bipartite graphs as models of complex networks," Physica A: Statistical and Theoretical Physics, vol. 371, no. 2, pp. 795 - 813, 2006.
-
(2006)
Physica A: Statistical and Theoretical Physics
, vol.371
, Issue.2
, pp. 795-813
-
-
Guillaume, J.-L.1
Latapy, M.2
-
11
-
-
4243878877
-
-
Cooperative Association for Internet Data Analysis (CAIDA), "Internet Traces," http://www.caida.org/data/passive/passive-2009- dataset.xml.
-
Internet Traces
-
-
-
12
-
-
4444266989
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
October
-
J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme," Computer Networks, vol. 46, no. 2, pp. 253-272, October 2004.
-
(2004)
Computer Networks
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.3
Moon, S.4
-
13
-
-
0012440707
-
-
University of Oregon
-
University of Oregon, "Route Views Project," http://www.routeviews.org/.
-
Route Views Project
-
-
-
15
-
-
4344627335
-
The spread of the witty worm
-
C. Shannon and D. Moore, "The spread of the witty worm," IEEE Security and Privacy, vol. 2, no. 4, pp. 46 - 50, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
17
-
-
66249144888
-
Unconstrained endpoint profiling (googling the internet)
-
August
-
I. Trestian, S. Ranjan, A. Kuzmanovi, and A. Nucci, "Unconstrained endpoint profiling (googling the internet)," in Proceedings of ACM SIGCOMM, August 2008.
-
(2008)
Proceedings of ACM SIGCOMM
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovi, A.3
Nucci, A.4
-
18
-
-
79960875096
-
Network traffic analysis using behavior-based clustering
-
K. Theriault, D. Vukelich, W. Farrell, D. Kong, and J. Lowry, "Network Traffic Analysis Using Behavior-Based Clustering," BBN Technologies Technical Report, 2010.
-
(2010)
BBN Technologies Technical Report
-
-
Theriault, K.1
Vukelich, D.2
Farrell, W.3
Kong, D.4
Lowry, J.5
-
19
-
-
85077580912
-
Role classification of hosts within enterprise networks based on connection patterns
-
June
-
G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks Based on Connection Patterns," in Proceedings of USENIX Annual Technical Conference, June 2003.
-
(2003)
Proceedings of USENIX Annual Technical Conference
-
-
Tan, G.1
Poletto, M.2
Guttag, J.3
Kaashoek, F.4
-
20
-
-
34248389195
-
Analysis of communities of interest in data networks
-
March
-
W. Aiello, C. Kalmanek, P. McDaniel, S. Sen, O. Spatscheck, and J. Merwe, "Analysis of Communities of Interest in Data Networks," in Proceedings of Passive and Active Measurments Workshop, March 2005.
-
(2005)
Proceedings of Passive and Active Measurments Workshop
-
-
Aiello, W.1
Kalmanek, C.2
McDaniel, P.3
Sen, S.4
Spatscheck, O.5
Merwe, J.6
-
21
-
-
33645813594
-
Flow classification by histograms: Or how to go on safari in the internet
-
June
-
A. Soule, K. Salamatia, N. Taft, R. Emilion, and K. Papagiannaki, "Flow classification by histograms: or how to go on safari in the internet," in Proceedings of ACM SIGMETRICS, June 2004.
-
(2004)
Proceedings of ACM SIGMETRICS
-
-
Soule, A.1
Salamatia, K.2
Taft, N.3
Emilion, R.4
Papagiannaki, K.5
-
22
-
-
1542360060
-
Pop-level and access-link-level traffic dynamics in a tier-1 POP
-
San Francisco, CA
-
S. Bhattacharyya, C. Diot, J. Jetcheva, and N. Taft, "Pop-level and access-link-level traffic dynamics in a tier-1 POP," in Proceedings of ACM SIGCOMM Workshop on Internet Measurement, San Francisco, CA, 2001.
-
(2001)
Proceedings of ACM SIGCOMM Workshop on Internet Measurement
-
-
Bhattacharyya, S.1
Diot, C.2
Jetcheva, J.3
Taft, N.4
-
25
-
-
85089726744
-
On network-level clusters for spam detection
-
March
-
Z. Qian, Z. Mao, Y. Xie, and F. Yu, "On Network-level Clusters for Spam Detection," in Proceedings of Network and Distributed System Security Symposium (NDSS), March 2010.
-
(2010)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Qian, Z.1
Mao, Z.2
Xie, Y.3
Yu, F.4
-
27
-
-
36949011812
-
How dynamic are IP addresses?
-
August
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, "How dynamic are IP addresses?" in Proceedings of ACM SIGCOMM, August 2007.
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
28
-
-
78149305170
-
Understanding block-level address usage in the visible internet
-
August
-
X. Cai, and J. Heidemann, "Understanding Block-level Address Usage in the Visible Internet," in Proceedings of ACM SIGCOMM, August 2010.
-
(2010)
Proceedings of ACM SIGCOMM
-
-
Cai, X.1
Heidemann, J.2
-
29
-
-
84976851626
-
Discovering shared interests using graph analysis
-
August
-
M. Schwartz, and D. Wood, "Discovering shared interests using graph analysis," Communications of the ACM, vol. 36, no. 8, pp. 78 - 89, August 1993.
-
(1993)
Communications of the ACM
, vol.36
, Issue.8
, pp. 78-89
-
-
Schwartz, M.1
Wood, D.2
-
30
-
-
85059753615
-
BotGrep: Finding P2P bots with structured graph analysis
-
August
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov, "BotGrep: Finding P2P Bots with Structured Graph Analysis," in Proceedings of USENIX Security Symposium, August 2010.
-
(2010)
Proceedings of USENIX Security Symposium
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
|