-
1
-
-
84889022645
-
-
May
-
G. Szab́o, Z. Tuŕanyi, L. Toka, S. Molńar, and A. Santos, "Automatic protocol signature generation framework for deep packet inspection," pp. 291-299, May 2011.
-
(2011)
Automatic Protocol Signature Generation Framework for Deep Packet Inspection
, pp. 291-299
-
-
Szab́o, G.1
Tuŕanyi, Z.2
Toka, L.3
Molńar, S.4
Santos, A.5
-
2
-
-
77952019854
-
K-dimensional trees for continuous traffic classification
-
F. Ricciato, M. Mellia, and E. Biersack, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, Apr.
-
V. Carela-Español, P. Barlet-Ros, M. Soĺe-Siḿo, A. Dainotti, W. de Donato, and A. Pescaṕe, "K-dimensional trees for continuous traffic classification," in Proceedings of the Second international conference on Traffic Monitoring and Analysis, ser. Lecture Notes in Computer Science, F. Ricciato, M. Mellia, and E. Biersack, Eds., vol. 6003. Berlin, Heidelberg: Springer Berlin Heidelberg, Apr. 2010, pp. 141-154.
-
(2010)
Proceedings of the Second International Conference on Traffic Monitoring and Analysis, Ser. Lecture Notes in Computer Science
, vol.6003
, pp. 141-154
-
-
Carela-Español, V.1
Barlet-Ros, P.2
Soĺe-Siḿo, M.3
Dainotti, A.4
De Donato, W.5
Pescaṕe, A.6
-
3
-
-
78650639149
-
Realtime classification for encrypted traffic
-
P. Festa, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, May
-
R. Bar-Yanai, M. Langberg, D. Peleg, and L. Roditty, "Realtime classification for encrypted traffic," in Proceedings of the 9th international conference on Experimental Algorithms, ser. Lecture Notes in Computer Science, P. Festa, Ed., vol. 6049. Berlin, Heidelberg: Springer Berlin Heidelberg, May 2010, pp. 373-385.
-
(2010)
Proceedings of the 9th International Conference on Experimental Algorithms, Ser. Lecture Notes in Computer Science
, vol.6049
, pp. 373-385
-
-
Bar-Yanai, R.1
Langberg, M.2
Peleg, D.3
Roditty, L.4
-
4
-
-
84856254197
-
Issues and future directions in traffic classification
-
Jan.
-
A. Dainotti, A. Pescape, and K. Claffy, "Issues and future directions in traffic classification," IEEE Network, vol. 26, no. 1, pp. 35-40, Jan. 2012.
-
(2012)
IEEE Network
, vol.26
, Issue.1
, pp. 35-40
-
-
Dainotti, A.1
Pescape, A.2
Claffy, K.3
-
5
-
-
84867522520
-
Methodologies for generating HTTP streaming video workloads to evaluate web server performance
-
New York, New York, USA: ACM Press, Jun.
-
J. Summers, T. Brecht, D. Eager, and B. Wong, "Methodologies for generating HTTP streaming video workloads to evaluate web server performance," in Proceedings of the 5th Annual International Systems and Storage Conference on-SYSTOR '12. New York, New York, USA: ACM Press, Jun. 2012, pp. 1-12.
-
(2012)
Proceedings of the 5th Annual International Systems and Storage Conference On-SYSTOR '12
, pp. 1-12
-
-
Summers, J.1
Brecht, T.2
Eager, D.3
Wong, B.4
-
6
-
-
80053148796
-
On blind mice and the elephant: Understanding the network impact of a large distributed system
-
Oct.
-
J. S. Otto, M. A. Śanchez, D. R. Choffnes, F. E. Bustamante, and G. Siganos, "On blind mice and the elephant: understanding the network impact of a large distributed system," ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 110-110-121-121, Oct. 2011.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.4
, pp. 110110-121121
-
-
Otto, J.S.1
Śanchez, M.A.2
Choffnes, D.R.3
Bustamante, F.E.4
Siganos, G.5
-
8
-
-
77955378718
-
Stochastic packet inspection for TCP traffic
-
IEEE, May
-
G. La Mantia, D. Rossi, A. Finamore, M. Mellia, and M. Meo, "Stochastic Packet Inspection for TCP Traffic," in 2010 IEEE International Conference on Communications. IEEE, May 2010, pp. 1-6.
-
(2010)
2010 IEEE International Conference on Communications
, pp. 1-6
-
-
La Mantia, G.1
Rossi, D.2
Finamore, A.3
Mellia, M.4
Meo, M.5
-
9
-
-
73549107668
-
Autosig-automatically generating signatures for applications
-
IEEE
-
M. Ye, K. Xu, J. Wu, and H. Po, "AutoSig-Automatically Generating Signatures for Applications," in 2009 Ninth IEEE International Conference on Computer and Information Technology, vol. 2. IEEE, 2009, pp. 104-109.
-
(2009)
2009 Ninth IEEE International Conference on Computer and Information Technology
, vol.2
, pp. 104-109
-
-
Ye, M.1
Xu, K.2
Wu, J.3
Po, H.4
-
10
-
-
84873555013
-
-
IANA [Online]. Available
-
IANA, "Service Name and Transport Protocol Port Number Registry," 2013. [Online]. Available: http://www.iana.org/assignments/ service-names-port-numbers/service-names-port-numbers.xml
-
(2013)
Service Name and Transport Protocol Port Number Registry
-
-
-
11
-
-
84877785008
-
-
Nov.
-
G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On dominant characteristics of residential broadband internet traffic," pp. 90-102, Nov. 2009.
-
(2009)
On Dominant Characteristics of Residential Broadband Internet Traffic
, pp. 90-102
-
-
Maier, G.1
Feldmann, A.2
Paxson, V.3
Allman, M.4
-
12
-
-
79951501937
-
Flow classification using clustering and association rule mining
-
IEEE, Dec.
-
U. K. Chaudhary, I. Papapanagiotou, and M. Devetsikiotis, "Flow classification using clustering and association rule mining," in 2010 15th IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD). IEEE, Dec. 2010, pp. 76-80.
-
(2010)
2010 15th IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD)
, pp. 76-80
-
-
Chaudhary, U.K.1
Papapanagiotou, I.2
Devetsikiotis, M.3
-
13
-
-
77950921112
-
Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison
-
Jun.
-
M. Soysal and E. G. Schmidt, "Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison," Performance Evaluation, vol. 67, no. 6, pp. 451-467, Jun. 2010.
-
(2010)
Performance Evaluation
, vol.67
, Issue.6
, pp. 451-467
-
-
Soysal, M.1
Schmidt, E.G.2
-
18
-
-
70449528324
-
Investigation of self-organizing map for genetic algorithm
-
Feb.
-
E. Kita, S. Kan, and Z. Fei, "Investigation of self-organizing map for genetic algorithm," Advances in Engineering Software, vol. 41, no. 2, pp. 148-153, Feb. 2010.
-
(2010)
Advances in Engineering Software
, vol.41
, Issue.2
, pp. 148-153
-
-
Kita, E.1
Kan, S.2
Fei, Z.3
-
19
-
-
74949141607
-
Mining opinions from messenger
-
New York, New York, USA: ACM Press, Nov.
-
J. S. Ryu, W. Y. Kim, K. I. Kim, and U. M. Kim, "Mining opinions from messenger," in Proceedings of the 2nd International Conference on Interaction Sciences Information Technology, Culture and Human-ICIS '09. New York, New York, USA: ACM Press, Nov. 2009, pp. 287-290.
-
(2009)
Proceedings of the 2nd International Conference on Interaction Sciences Information Technology, Culture and Human-ICIS '09
, pp. 287-290
-
-
Ryu, J.S.1
Kim, W.Y.2
Kim, K.I.3
Kim, U.M.4
-
20
-
-
77958544490
-
A novel rule-based Intrusion Detection System using data mining
-
Jul.
-
L. Li, D.-Z. Yang, and F.-C. Shen, "A novel rule-based Intrusion Detection System using data mining," in 2010 3rd International Conference on Computer Science and Information Technology. IEEE, Jul. 2010, pp. 169-172.
-
(2010)
2010 3rd International Conference on Computer Science and Information Technology IEEE
, pp. 169-172
-
-
Li, L.1
Yang, D.-Z.2
Shen, F.-C.3
-
21
-
-
40749153192
-
Using information gain to improve multimodal information retrieval systems
-
May
-
M. Mart́?n-Valdivia, M. D́?az-Galiano, A. Montejo-Raez, and L. Ureña Ĺopez, "Using information gain to improve multimodal information retrieval systems," Information Processing & Management, vol. 44, no. 3, pp. 1146-1158, May 2008.
-
(2008)
Information Processing & Management
, vol.44
, Issue.3
, pp. 1146-1158
-
-
Mart́n-Valdivia, M.1
-
22
-
-
80055049702
-
Mixed variable structural optimization using Firefly Algorithm
-
Dec.
-
A. H. Gandomi, X.-S. Yang, and A. H. Alavi, "Mixed variable structural optimization using Firefly Algorithm," Computers & Structures, vol. 89, no. 23-24, pp. 2325-2336, Dec. 2011.
-
(2011)
Computers & Structures
, vol.89
, Issue.23-24
, pp. 2325-2336
-
-
Gandomi, A.H.1
Yang, X.-S.2
Alavi, A.H.3
-
24
-
-
33745727034
-
Multi-objective optimization using genetic algorithms: A tutorial
-
A. Konak, D. Coit, and A. Smith, "Multi-objective optimization using genetic algorithms: A tutorial," Reliability Engineering & System Safety, vol. 91, no. 9, pp. 992-1007, 2006.
-
(2006)
Reliability Engineering & System Safety
, vol.91
, Issue.9
, pp. 992-1007
-
-
Konak, A.1
Coit, D.2
Smith, A.3
|