-
1
-
-
84949016055
-
-
JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE)
-
JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE). http://www.jyvsectec. fi/en/rgce/
-
-
-
-
2
-
-
84916211158
-
Analysis of HTTP requests for anomaly detection of web attacks
-
Zolotukhin, M., Hämäläinen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406–411, August 2014
-
(2014)
2014 IEEE 12Th International Conference on Dependable, Autonomic and Secure Computing
, pp. 406-411
-
-
Zolotukhin, M.1
Hämäläinen, T.2
Kokkonen, T.3
Siltanen, J.4
-
3
-
-
0035416013
-
Difficulties in Simulating the Internet
-
Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)
-
(2001)
IEEE/ACM Trans. Netw
, vol.9
, Issue.4
, pp. 392-403
-
-
Floyd, S.1
Paxson, V.2
-
4
-
-
0035362041
-
Modeling of HTTP traffic
-
Casilari, E., Gonzblez, F. J., Sandoval, F.: Modeling of HTTP traffic. Communications Letters, IEEE 5(6), 272–274 (2001)
-
(2001)
Communications Letters, IEEE
, vol.5
, Issue.6
, pp. 272-274
-
-
Casilari, E.1
Gonzblez, F.J.2
Sandoval, F.3
-
5
-
-
84865800505
-
A tool for the generation of realistic network workload for emerging networking scenarios
-
Botta, A., Dainotti, A., Pescapè, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531–3547 (2012)
-
(2012)
Computer Networks (Elsevier)
, vol.14
, Issue.15
, pp. 3531-3547
-
-
Botta, A.1
Dainotti, A.2
Pescapè, A.3
-
6
-
-
33745672516
-
On interactive internet traffic replay
-
In: Valdes, A., Zamboni, D. (eds.), Springer, Heidelberg
-
Hong, S.-S., Wu, S.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247–264. Springer, Heidelberg (2006)
-
(2006)
RAID 2005. LNCS
, vol.3858
, pp. 247-264
-
-
Hong, S.-S.1
Wu, S.2
-
7
-
-
70449361675
-
On traffic characteristics of a broadband wireless internet access
-
Pries, R., Wamser, F., Staehle, D., Heck, K., Tran-Gia, P.: On traffic characteristics of a broadband wireless internet access. In: Next Generation Internet Networks, NGI 2009, pp. 1–7, July 2009
-
(2009)
Next Generation Internet Networks, NGI 2009
, pp. 1-7
-
-
Pries, R.1
Wamser, F.2
Staehle, D.3
Heck, K.4
Tran-Gia, P.5
-
8
-
-
84891912996
-
Characterizing service providers traffic of mobile internet services in cellular data network
-
Li, T., Liu, J., Lei, Z., Xie, Y.: Characterizing service providers traffic of mobile internet services in cellular data network. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 134–139, August 2013
-
(2013)
2013 5Th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)
, vol.1
, pp. 134-139
-
-
Li, T.1
Liu, J.2
Lei, Z.3
Xie, Y.4
-
9
-
-
84949016056
-
-
The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool
-
The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool. http://www.postel. org/tg/
-
-
-
-
10
-
-
84949016057
-
-
The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool
-
The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool. http://www.ittc. ku. edu/netspec/
-
-
-
-
11
-
-
84949016058
-
-
Netperf
-
Netperf. http://www.netperf. org/netperf/
-
-
-
-
12
-
-
84949016059
-
-
pksh-the Packet Shell
-
pksh-the Packet Shell. http://tecsiel. it/pksh/index.html
-
-
-
-
13
-
-
84949016060
-
-
Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator
-
Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator. http://traffic.comics. unina. it/software/ITG/
-
-
-
-
14
-
-
84892516746
-
An experimental characterization of the internal generation cycle of an open-source software traffic generator
-
Angrisani, L., Botta, A., Miele, G., Vadursi, M.: An experimental characterization of the internal generation cycle of an open-source software traffic generator. In: 2013 IEEE International Workshop on Measurements and Networking Proceedings (M N), pp. 74–78, October 2013
-
(2013)
2013 IEEE International Workshop on Measurements and Networking Proceedings (M N)
, pp. 74-78
-
-
Angrisani, L.1
Botta, A.2
Miele, G.3
Vadursi, M.4
-
15
-
-
77956386958
-
Do You Trust Your Software-Based Traffic Generator
-
Botta, A., Dainotti, A., Pescapè, A.: Do You Trust Your Software-Based Traffic Generator. IEEE Communications Magazine, 158–165 (2010)
-
(2010)
IEEE Communications Magazine
, pp. 158-165
-
-
Botta, A.1
Dainotti, A.2
Pescapè, A.3
-
17
-
-
84949016062
-
-
Linux Programmer’s Manual RAW(7)
-
Kleen, A.: Linux Programmer’s Manual RAW(7). http://www.manpages. info/linux/raw. 7.html
-
-
-
Kleen, A.1
-
18
-
-
84949016063
-
-
Linux Programmer’s Manual TCP(7)
-
Kleen, A., Singhvi, N., Kuznetsov’s, A.: Linux Programmer’s Manual TCP(7). http://www.manpages. info/linux/tcp. 7.html
-
-
-
Kleen, A.1
Singhvi, N.2
Kuznetsov’S, A.3
-
19
-
-
84949016064
-
-
Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981
-
Postel, J.: Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981. http://www.ietf. org/rfc/rfc793. txt
-
-
-
Postel, J.1
-
20
-
-
69249204694
-
-
The Security Blog
-
Tanase, M.: IP Spoofing: An Introduction. The Security Blog, March 2003. http://www.symantec.com/connect/articles/ip-spoofing-introduction
-
(2003)
IP Spoofing: An Introduction
-
-
Tanase, M.1
-
21
-
-
84949016065
-
-
WireShark Wiki, Libpcap File Format
-
WireShark Wiki, Libpcap File Format. http://wiki. wireshark. org/Development/LibpcapFileFormat/
-
-
-
-
22
-
-
84949016066
-
-
Tcpreplay
-
Tcpreplay. http://tcpreplay. synfin. net/
-
-
-
-
23
-
-
60449112639
-
ParaSynTG: A parameterized synthetic trace generator for representation of WWW traffic
-
June 16-18
-
Khayari, R. E. A., Rücker, M., Lehman, A., Musovic, A.: ParaSynTG: a parameterized synthetic trace generator for representation of WWW traffic. In: SPECTS (2008), pp. 317–323, June 16-18, 2008
-
(2008)
SPECTS (2008)
, pp. 317-323
-
-
Khayari, R.E.A.1
Rücker, M.2
Lehman, A.3
Musovic, A.4
-
24
-
-
84949016067
-
-
User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980
-
Postel, J.: User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980. http://www.ietf. org/rfc/rfc768. txt
-
-
-
Postel, J.1
-
25
-
-
84949016068
-
-
The GO Programming Language
-
The GO Programming Language. https://golang. org/
-
-
-
-
26
-
-
0018005391
-
Communicating Sequential Processess
-
Hoare, C. A. R.: Communicating Sequential Processess. Communications of the ACM 21(8), 666–677 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.8
, pp. 666-677
-
-
Hoare, C.A.R.1
-
28
-
-
84949016069
-
-
Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013
-
Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013. http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus_jyvaskylassa_13.-17. 5. 2013. 5502. news
-
-
-
-
29
-
-
84949016070
-
-
Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kybersuorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä
-
Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kybersuorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä. http://www.fdf. fi/wcm/su+puolustusvoimat. fi/pv. fi+staattinen+sivusto+su/puolustusvoimat/tiedotteet/kybersuorituskykya+hiotaan+viranomaisten+ja+korkeakoulujen+yhteistyolla
-
-
-
-
30
-
-
33846670896
-
Realistic Internet traffic simulation through mixture modeling and a case study
-
December 4–7
-
Luo, S., Marin, G. A.: Realistic Internet traffic simulation through mixture modeling and a case study. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2408–2416, December 4–7, 2005
-
(2005)
Proceedings of the 2005 Winter Simulation Conference
, pp. 2408-2416
-
-
Luo, S.1
Marin, G.A.2
|