Attribution and Aggregation of Network Flows for Security Analysis
暂无分享,去创建一个
[1] Valentine Crespi,et al. Decentralized sensing and tracking for UAV scheduling , 2004, SPIE Defense + Commercial Sensing.
[2] Jon Crowcroft,et al. Flow aggregation for enhanced TCP over wide-area wireless , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Jorge Arturo Cobb. Preserving quality of service guarantees in spite of flow aggregation , 2002, TNET.
[4] CobbJorge Arturo. Preserving quality of service guarantees in spite of flow aggregation , 2002 .
[5] Vincent H. Berk,et al. Covert Channel Detection Using Process Query Systems , 2005 .
[6] Vincent H. Berk,et al. An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.
[7] Vincent H. Berk,et al. Detection of complex cyber attacks , 2006, SPIE Defense + Commercial Sensing.
[8] Vincent H. Berk,et al. Process query systems for network security monitoring , 2005, SPIE Defense + Commercial Sensing.
[9] George Cybenko,et al. Identifying and tracking dynamic processes in social networks , 2006, SPIE Defense + Commercial Sensing.