Bottleneck analysis and traffic congestion avoidance
暂无分享,去创建一个
Mohammed Abdul Qadeer | Afaq Hasan Khan | Ahmad Ali Habeeb | M. A. Hafeez | M. Qadeer | A. H. Khan | Mohammed A. Hafeez
[1] George Varghese,et al. Network Algorithmics-An Interdisciplinary Approach to Designing Fast Networked Devices , 2004 .
[2] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[3] Neil Matthew,et al. Beginning Linux Programming , 1996 .
[4] Mounir Frikha,et al. Malicious sniffing systems detection platform , 2004, 2004 International Symposium on Applications and the Internet. Proceedings..
[5] H. S. Chandrashekar,et al. Packet sniffing: a brief introduction , 2003 .
[6] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[7] H. Hurley. computer networking. , 1996, Ostomy/wound management.
[8] K. Tamine,et al. Intelligent Agents for Distributed Intrusion Detection System , 2007 .
[9] Jill Slay,et al. Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[10] Wei Guo,et al. Network monitoring in broadband network , 2001, Proceedings of the Second International Conference on Web Information Systems Engineering.
[11] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[12] A. Matrawy,et al. Bottleneck Analysis of Traffic Monitoring using Wireshark , 2007, 2007 Innovations in Information Technologies (IIT).
[13] Charles Hornig. A Standard for the Transmission of IP Datagrams over Ethernet Networks , 1984, RFC.
[14] Ian Graham,et al. Design principles for accurate passive measurement , 2000 .