An Efficient P2P Traffic Identification Scheme
暂无分享,去创建一个
[1] Putra Sumari,et al. CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks , 2010, J. Digit. Content Technol. its Appl..
[2] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[3] N. Saravana Selvam,et al. Active Network Based Queue Management for Providing QoS Using IXP 2400 Network Processor , 2010, J. Convergence Inf. Technol..
[4] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[5] Panayiotis Mavrommatis,et al. Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[6] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[7] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[8] Ruchuan Wang,et al. A Novel P2P Traffic Identification Model Based on Ensemble Learning , 2011 .
[9] Ruchuan Wang,et al. P2P Replica-tree based Consistency Maintenance Strategy , 2010, J. Digit. Content Technol. its Appl..
[10] Bo Li,et al. On the efficiency of collaborative caching in ISP-aware P2P networks , 2011, 2011 Proceedings IEEE INFOCOM.
[11] Jonathan S. Turner,et al. ClassBench: A Packet Classification Benchmark , 2005, IEEE/ACM Transactions on Networking.
[12] Yukiko Sawaya,et al. Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.
[13] Qian Wang,et al. Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network , 2010, J. Convergence Inf. Technol..