-
1
-
-
33746913393
-
Cisco systems NetFlow services export version 9
-
Oct.
-
B. Claise, "Cisco Systems NetFlow Services Export Version 9," RFC 3954, Oct. 2004.
-
(2004)
RFC 3954
-
-
Claise, B.1
-
2
-
-
77957759083
-
Architecture for IP flow information export
-
Mar.
-
G. Sadasivan, R. Systems, N. Brownlee, B. Claise, and J. Quittek, "Architecture for IP Flow Information Export," RFC 5470, Mar. 2009.
-
(2009)
RFC 5470
-
-
Sadasivan, G.1
Systems, R.2
Brownlee, N.3
Claise, B.4
Quittek, J.5
-
3
-
-
80052704033
-
Design of a stream-based IP flow record query language
-
Springer, Oct.
-
V. Marinov and J. Schönwälder, "Design of a Stream-based IP Flow Record Query Language," in Proc. DSOM 2009. Springer, Oct. 2009.
-
(2009)
Proc. DSOM 2009
-
-
Marinov, V.1
Schönwälder, J.2
-
4
-
-
80052773417
-
Implementation of a stream-based IP flow record query language
-
Springer, Jun.
-
K. Kanev, N. Melnikov, and J. Schönwälder, "Implementation of a Stream-based IP Flow Record Query Language," in Proc. of AIMS 2010. Springer, Jun. 2010.
-
(2010)
Proc. of AIMS 2010
-
-
Kanev, K.1
Melnikov, N.2
Schönwälder, J.3
-
5
-
-
0004098160
-
-
I-D , Oct.
-
Y. Y. Goland, T. Cai, P. Leach, Y Gu, and S. Albright, "Simple service discovery protocol/1.0," I-D , Oct. 1999.
-
(1999)
Simple Service Discovery Protocol/1.0
-
-
Goland, Y.Y.1
Cai, T.2
Leach, P.3
Gu, Y.4
Albright, S.5
-
6
-
-
33750309882
-
An analysis of the skype peer-to-peer internet telephony protocol
-
IEEE
-
S. Baset and H. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol," in Proc. oflNFOCOM 2006. IEEE, 2006.
-
(2006)
Proc. OflNFOCOM 2006
-
-
Baset, S.1
Schulzrinne, H.2
-
7
-
-
80052743733
-
Revealing skype traffic: When randomness plays with you
-
Oct.
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: When Randomness Plays with You," SIGCOMM CCR, vol. 37, no. 4, Oct. 2007.
-
(2007)
SIGCOMM CCR
, vol.37
, Issue.4
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
8
-
-
51349155248
-
Tracking down skype traffic
-
IEEE
-
D. Bonfiglio, M. Mellia, M. Meo, N. Ritacca, and D. Rossi, "Tracking Down Skype Traffic," in Proc. 27th Conference on Computer Communications (INFOCOM 2008). IEEE, 2008.
-
(2008)
Proc. 27th Conference on Computer Communications (INFOCOM 2008)
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Ritacca, N.4
Rossi, D.5
-
10
-
-
1642305819
-
STUN - Simple traversal of user datagram protocol (UDP) through network address translators (NATs)
-
Mar.
-
J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, "STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)," RFC 3489, Mar. 2003.
-
(2003)
RFC 3489
-
-
Rosenberg, J.1
Weinberger, J.2
Huitema, C.3
Mahy, R.4
-
11
-
-
34848889285
-
Understanding instant messaging traffic characteristics
-
IEEE, Jun.
-
Z. Xiao, L. Guo, and J. Tracey, "Understanding Instant Messaging Traffic Characteristics," in Proc. of ICDCS 2007. IEEE, Jun. 2007.
-
(2007)
Proc. of ICDCS 2007
-
-
Xiao, Z.1
Guo, L.2
Tracey, J.3
-
12
-
-
0012359238
-
Post office protocol - Version 3
-
May
-
J. Myers and M. Rose, "Post Office Protocol - Version 3," RFC 1939, May 1996.
-
(1996)
RFC 1939
-
-
Myers, J.1
Rose, M.2
-
13
-
-
21644483570
-
Internet message access protocol -version 4revl
-
Mar.
-
M. Crispin, "Internet Message Access Protocol -Version 4revl," RFC 3501, Mar. 2003.
-
(2003)
RFC 3501
-
-
Crispin, M.1
-
15
-
-
0020849266
-
Maintaining knowledge about temporal intervals
-
Nov.
-
J. F. Allen, "Maintaining Knowledge about Temporal Intervals," Communications of the ACM, vol. 26, no. 11, pp. 832-843, Nov. 1983.
-
(1983)
Communications of the ACM
, vol.26
, Issue.11
, pp. 832-843
-
-
Allen, J.F.1
-
16
-
-
24344442716
-
Toward the accurate identification of network applications
-
A. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," in Proc. PAM 2005, 2005, pp. 41-54.
-
(2005)
Proc. PAM 2005
, pp. 41-54
-
-
Moore, A.1
Papagiannaki, K.2
-
17
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, "Traffic Classification on the Fly," SIGCOMM CCR, vol. 36, no. 2, 2006.
-
(2006)
SIGCOMM CCR
, vol.36
, Issue.2
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
18
-
-
19944406146
-
Accurate, scalable in-network identification of P2P traffic using application signatures
-
ACM
-
S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-network Identification of P2P Traffic Using Application Signatures," in Proc. of WWW 2004. ACM, 2004.
-
(2004)
Proc. of WWW 2004
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
19
-
-
56449085285
-
Visualizing large-scale ip traffic flows
-
November
-
F. Mansmann, F Fischer, D. A. Keim, and S. C. North, "Visualizing large-scale ip traffic flows," in Proc. of 12th International Workshop Vision, Modeling, and Visualization, November 2007.
-
(2007)
Proc. of 12th International Workshop Vision, Modeling, and Visualization
-
-
Mansmann, F.1
Fischer, F.2
Keim, D.A.3
North, S.C.4
-
20
-
-
14944345677
-
Transport layer identification of P2P traffic
-
ACM
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport layer identification of P2P traffic," in Proc. of IMC 2004. ACM, 2004.
-
(2004)
Proc. of IMC 2004
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
21
-
-
43949093547
-
Identification and analysis of peer-to-peer traffic
-
M. Perényi, T. D. Dang, A. Gefferth, and S. Molnár, "Identification and analysis of peer-to-peer traffic," JCM, vol. 1, no. 7, pp. 36-46, 2006.
-
(2006)
JCM
, vol.1
, Issue.7
, pp. 36-46
-
-
Perényi, M.1
Dang, T.D.2
Gefferth, A.3
Molnár, S.4
-
22
-
-
80052744643
-
Empirical analysis of application-level traffic classification using supervised machine learning
-
Springer
-
B. Park, Y J. Won, M.-J. Choi, M.-S. Kim, and J. W Hong, "Empirical analysis of application-level traffic classification using supervised machine learning," in Proc. of APNOMS 2008. Springer, 2008.
-
(2008)
Proc. of APNOMS 2008
-
-
Park, B.1
Won, Y.J.2
Choi, M.-J.3
Kim, M.-S.4
Hong, J.W.5
-
23
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," SIGCOMM CCR, vol. 35, no. 4, 2005.
-
(2005)
SIGCOMM CCR
, vol.35
, Issue.4
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
24
-
-
33846190721
-
Host behaviour based early detection of worm outbreaks in internet backbones
-
IEEE
-
T. Dubendorfer and B. Plattner, "Host behaviour based early detection of worm outbreaks in internet backbones," in Proc. of WETICE 2005. IEEE, 2005.
-
(2005)
Proc. of WETICE 2005
-
-
Dubendorfer, T.1
Plattner, B.2
-
25
-
-
43949111011
-
A two-layered anomaly detection technique based on multi-modal flow behavior models
-
M. P. Stoecklin, J.-Y L. Boudec, and A. Kind, "A two-layered anomaly detection technique based on multi-modal flow behavior models," in PAM, 2008, pp. 212-221.
-
(2008)
PAM
, pp. 212-221
-
-
Stoecklin, M.P.1
Boudec, J.-Y.L.2
Kind, A.3
-
26
-
-
33947634049
-
A DoS resilient flow-level intrusion detection approach for high-speed networks
-
IEEE
-
Y Gao, Z. Li, and Y Chen, "A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks," in Proc. of ICDCS 2006. IEEE, 2006.
-
(2006)
Proc. of ICDCS 2006
-
-
Gao, Y.1
Li, Z.2
Chen, Y.3
|