Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA
暂无分享,去创建一个
[1] Onno J. Boxma. Fluid Queues and Regular Variation , 1996, Perform. Evaluation.
[2] J. W. Roberts. Traffic theory and the Internet , 2001 .
[3] Francisco Herrera,et al. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..
[4] Saibal K. Pal,et al. Web Mining and Analytics for Improving E-Government Services in India , 2017 .
[5] James Won-Ki Hong,et al. The Architecture of NG-MON: A Passive Network Monitoring System for High-Speed IP Networks , 2002, DSOM.
[6] Randy H. Katz,et al. An algebraic approach to practical and scalable overlay network monitoring , 2004, SIGCOMM '04.
[7] Sebastian Zander,et al. Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[8] Antonia Micalizzi. If It Was , 2012 .
[9] Jiawei Han,et al. Data-Driven Contextual Valence Shifter Quantification for Multi-Theme Sentiment Analysis , 2016, CIKM.
[10] Marcos K. Aguilera,et al. Detecting failures in distributed systems with the Falcon spy network , 2011, SOSP.
[11] George Pavlou,et al. Exploiting agent mobility for large-scale network monitoring , 2002, IEEE Netw..
[12] Milton L. Mueller,et al. The end of the net as we know it? Deep packet inspection and internet governance , 2011, New Media Soc..
[13] Jeffrey E. Boyd,et al. Statistical tracking in video traffic surveillance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[14] Dong Wei,et al. IP Traffic Monitoring: An Overview and Future Considerations , 2001, IEEE Pacific Rim Conference on Multimedia.
[15] M. Turon. MOTE-VIEW: a sensor network monitoring and management tool , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[16] Yonggang Wen,et al. Network monitoring in multicast networks using network coding , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[17] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.
[18] J. Ball,et al. Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security , 2013 .
[19] N.D. Georganas,et al. Self-Similar Processes in Communications Networks , 1998, IEEE Trans. Inf. Theory.
[20] Saibal K. Pal,et al. Network Monitoring and Internet Traffic Surveillance System: Issues and Challenges in India , 2016 .
[21] Saibal K. Pal,et al. Binary Division Fuzzy C-Means Clustering and Particle Swarm Optimization Based Efficient Intrusion Detection for E-Governance Systems , 2016 .
[22] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.
[23] Saibal K. Pal,et al. Design and Analysis of New Shuffle Encryption Schemes for Multimedia , 2012 .
[24] Anja Feldmann,et al. Measurement and analysis of IP network usage and behavior , 2000, IEEE Commun. Mag..
[25] Sotiris Ioannidis,et al. Efficient packet monitoring for network management , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[26] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[27] Sebastian Zander,et al. Self-Learning IP Traffic Classification Based on Statistical Flow Characteristics , 2005, PAM.
[28] Damianos Gavalas,et al. Advanced network monitoring applications based on mobile/intelligent agent technology , 2000, Comput. Commun..
[29] Brian Tierney,et al. An infrastructure for passive network monitoring of application data streams , 2003 .