-
1
-
-
24344442716
-
Toward the accurate identification of network applications
-
Boston, USA
-
MOORE A W, PAPAGIANNAKI K. Toward the accurate identification of network applications[A]. Proc of PAM 2005[C]. Boston, USA, 2005. 41-54.
-
(2005)
Proc of PAM 2005
, pp. 41-54
-
-
Moore, A.W.1
Papagiannaki, K.2
-
2
-
-
13844296614
-
Application-level traffic monitoring and an analysis on IP networks
-
KIM M S, WON Y J, HONG J W K. Application-level traffic monitoring and an analysis on IP networks[J]. ETRI Journal, 2005, 27(11): 22-42.
-
(2005)
ETRI Journal
, vol.27
, Issue.11
, pp. 22-42
-
-
Kim, M.S.1
Won, Y.J.2
Hong, J.W.K.3
-
3
-
-
35048887481
-
Flow clustering using machine learning techniques
-
Antibes Juan-les-Pins, France
-
MCGREGOR A, HALL M, LORIER P, et al. Flow clustering using machine learning techniques[A]. Proc of PAM 2004[C]. Antibes Juan-les-Pins, France, 2004. 205-214.
-
(2004)
Proc of PAM 2004
, pp. 205-214
-
-
Mcgregor, A.1
Hall, M.2
Lorier, P.3
-
7
-
-
14944383480
-
Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification
-
Taormina, Italy
-
ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification[A]. Proc of ACM SIGCOMM IMC 2004[C]. Taormina, Italy, 2004. 135-148.
-
(2004)
Proc of ACM SIGCOMM IMC 2004
, pp. 135-148
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
-
8
-
-
24344492729
-
Self-learning IP traffic classification based on statistical flow characteristics
-
Boston, USA
-
ZANDER S, NGUYEN T, ARMITAGE G J. Self-learning IP traffic classification based on statistical flow characteristics[A]. Proc of PAM2005[C]. Boston, USA, 2005. 325-328.
-
(2005)
Proc of PAM2005
, pp. 325-328
-
-
Zander, S.1
Nguyen, T.2
Armitage, G.J.3
-
9
-
-
84856647203
-
Internet archeology: Estimating individual application trends in incomplete historic traffic traces
-
Adelaide, Australia
-
ZANDER S, WILLIAMS N, ARMITAGE G. Internet archeology: estimating individual application trends in incomplete historic traffic traces[A]. Proc of PAM 2006[C]. Adelaide, Australia, 2006. 205-206.
-
(2006)
Proc of PAM 2006
, pp. 205-206
-
-
Zander, S.1
Williams, N.2
Armitage, G.3
-
11
-
-
14344265818
-
Internet traffic classification using bayesian analysis techniques
-
Banff, Canada
-
MOORE A W, ZUEV D. Internet traffic classification using bayesian analysis techniques[A]. Proc of ACM SIGMETRICS 2005[C]. Banff, Canada, 2005. 50-60.
-
(2005)
Proc of ACM SIGMETRICS 2005
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
12
-
-
24344465024
-
Discriminators for use in flow-based classification
-
RR-05-13, London: Intel Research, Cambridge
-
MOORE A W, ZUEV D. Discriminators for Use in Flow-Based Classification[R]. RR-05-13, London: Intel Research, Cambridge, 2005.
-
(2005)
-
-
Moore, A.W.1
Zuev, D.2
-
13
-
-
84863059742
-
Research on IDS-faced general-purpose application-level protocol identification technology
-
LIU Y X, XU Q L, YUN X C. Research on IDS-faced general-purpose application-level protocol identification technology[J]. Journal of Shandong University (Engineering Science), 2007, 37(1): 65-69.
-
(2007)
Journal of Shandong University (Engineering Science)
, vol.37
, Issue.1
, pp. 65-69
-
-
Liu, Y.X.1
Xu, Q.L.2
Yun, X.C.3
-
14
-
-
77749251203
-
Research of identification method based on P2P flow behavior characterization
-
GONG J, SUN Z X, GU Q. Research of identification method based on P2P flow behavior characterization[J]. Journal of Chinese Computer Systems, 2007, 28(1): 48-53.
-
(2007)
Journal of Chinese Computer Systems
, vol.28
, Issue.1
, pp. 48-53
-
-
Gong, J.1
Sun, Z.X.2
Gu, Q.3
-
15
-
-
78649998264
-
A new method on P2P traffic identification based on flow
-
LIU B, LI Z T, LI J. A new method on P2P traffic identification based on flow[J]. Journal of Xiamen University (Natural Science), 2007, 46(2): 132-135.
-
(2007)
Journal of Xiamen University (Natural Science)
, vol.46
, Issue.2
, pp. 132-135
-
-
Liu, B.1
Li, Z.T.2
Li, J.3
-
16
-
-
84863015836
-
Cisco. cisco IOS netflow introduction
-
Cisco. cisco IOS netflow introduction[EB/OL]. http://www.cisco.com/warp/public/732/Tech/NetFlow, 2006.
-
(2006)
-
-
-
18
-
-
39649123983
-
Modeling network traffic using generalized Cauchy process
-
LI M, LIM S C. Modeling network traffic using generalized Cauchy process[J]. Physica A, 2008, 387(11): 2584-2594.
-
(2008)
Physica A
, vol.387
, Issue.11
, pp. 2584-2594
-
-
Li, M.1
Lim, S.C.2
-
19
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
-
LI M. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks[J]. Computers and Security, 2006, 25(3): 213-220.
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
20
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
LI M. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition[J]. Computers and Security, 2004, 23(7): 549-558.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
|