Classification of Web Applications Using AiFlow Features
暂无分享,去创建一个
[1] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[2] James Won-Ki Hong,et al. Towards automated application signature generation for traffic identification , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[3] David Moore,et al. The CoralReef Software Suite as a Tool for System and Network Administrators , 2001, LISA.
[4] Vern Paxson,et al. Empirically derived analytic models of wide-area TCP connections , 1994, TNET.
[5] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.
[6] Anja Feldmann,et al. An analysis of Internet chat systems , 2003, IMC '03.
[7] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[8] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[9] Luca Salgarelli,et al. Comparing traffic classifiers , 2007, CCRV.
[10] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[11] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[12] M LevyHenry,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003 .
[13] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..