Categorizing Computing Assets According to Communication Patterns
暂无分享,去创建一个
[1] Bill Cheswick,et al. What Can You Do with Traceroute? , 2001, IEEE Internet Comput..
[2] S. Hadjiefthymiades,et al. Hypertext Transfer Protocol (HTTP) , 1996 .
[3] Jeffrey D. Case,et al. Simple network management protocol , 1995 .
[4] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[5] M. Filoni. Computing assets categorization according to collected configuration and usage information , 2001 .
[6] Jaideep Srivastava,et al. Grouping Web page references into transactions for mining World Wide Web browsing patterns , 1997, Proceedings 1997 IEEE Knowledge and Data Engineering Exchange Workshop.
[7] Robbie Allen,et al. Active Directory , 2018, Windows PowerShell 5 und PowerShell 7.
[8] Luca Deri,et al. Ntop: Beyond ping and traceroute , 1999, DSOM.
[9] James E. Pitkow,et al. In Search of Reliable Usage Data on the WWW , 1997, Comput. Networks.
[10] Luca Deri,et al. Effective traffic measurement using ntop , 2000 .
[11] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1990, RFC.
[12] Luca Deri,et al. Ntop: a Lightweight Open-Source Network IDS , 2000 .
[13] Philip S. Yu,et al. Data mining for path traversal patterns in a web environment , 1996, Proceedings of 16th International Conference on Distributed Computing Systems.
[14] Jon Postel,et al. Simple Mail Transfer Protocol , 1981, RFC.
[15] Robert Denn,et al. Windows 2000 Active Directory , 2000 .
[16] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[17] Drew Heywood. Networking with Microsoft TCP/IP , 1996 .
[18] Kevin Richards. Network based intrusion detection: A review of technologies , 1999, Comput. Secur..