Perspectives on tracing end-hosts: a survey summary
暂无分享,去创建一个
Jaideep Chandrashekar | Renata Teixeira | Nina Taft | Diana Joumblatt | N. Taft | R. Teixeira | J. Chandrashekar | D. Joumblatt
[1] Antony I. T. Rowstron,et al. Network exception handlers: host-network control in enterprise networks , 2008, SIGCOMM '08.
[2] KaragiannisThomas,et al. Network exception handlers , 2008 .
[3] M. Csíkszentmihályi,et al. Validity and Reliability of the Experience‐Sampling Method , 1987, The Journal of nervous and mental disease.
[4] Michalis Faloutsos,et al. Profiling the End Host , 2007, PAM.
[5] Junda Liu,et al. Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems , 2009, NSDI.
[6] Konstantina Papagiannaki,et al. Exploiting Temporal Persistence to Detect Covert Botnet Channels , 2009, RAID.
[7] Nick Feamster,et al. Detecting network neutrality violations with causal inference , 2009, CoNEXT '09.
[8] Sunny Consolvo,et al. Using the Experience Sampling Method to Evaluate Ubicomp Applications , 2003, IEEE Pervasive Comput..