Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Analysis and filtering of network traffic“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Analysis and filtering of network traffic" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Analysis and filtering of network traffic"
Rajaboevich, Gulomov Sherzod. „Comparative Analysis of Methods Content Filtering Network Traffic“. International Journal of Emerging Trends in Engineering Research 8, Nr. 5 (25.05.2020): 1561–69. http://dx.doi.org/10.30534/ijeter/2020/15852020.
Der volle Inhalt der QuelleKabala, Piotr, und Dariusz Laskowski. „Analysis of Network Traffic Filtering / Analiza Filtracji Ruchu Sieciowego“. Journal of KONBiN 33, Nr. 1 (01.09.2015): 41–60. http://dx.doi.org/10.1515/jok-2015-0004.
Der volle Inhalt der QuelleLu, Yao, Hanhong Jiang, Tao Liao, Chengcheng Xu und Chen Deng. „Characteristic Analysis and Modeling of Network Traffic for the Electromagnetic Launch System“. Mathematical Problems in Engineering 2019 (23.06.2019): 1–7. http://dx.doi.org/10.1155/2019/2929457.
Der volle Inhalt der QuelleNovakov, Stevan, Chung-Horng Lung, Ioannis Lambadaris und Nabil Seddigh. „A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection“. International Journal of Mobile Computing and Multimedia Communications 6, Nr. 1 (Januar 2014): 17–53. http://dx.doi.org/10.4018/ijmcmc.2014010102.
Der volle Inhalt der QuelleLee, Jae-Kook, Taeyoung Hong und Guohua Li. „Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network“. Journal of Communications and Networks 23, Nr. 3 (Juni 2021): 192–200. http://dx.doi.org/10.23919/jcn.2021.000011.
Der volle Inhalt der QuellePrivalov, Andrey, Vera Lukicheva, Igor Kotenko und Igor Saenko. „Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering“. Energies 12, Nr. 24 (13.12.2019): 4768. http://dx.doi.org/10.3390/en12244768.
Der volle Inhalt der QuelleFernández, Diego, Francisco J. Nóvoa, Fidel Cacheda und Víctor Carneiro. „Advancing Network Flow Information Using Collaborative Filtering“. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 25, Suppl. 2 (Dezember 2017): 97–112. http://dx.doi.org/10.1142/s021848851740013x.
Der volle Inhalt der QuelleJain, Sakshi, Mobin Javed und Vern Paxson. „Towards Mining Latent Client Identifiers from Network Traffic“. Proceedings on Privacy Enhancing Technologies 2016, Nr. 2 (01.04.2016): 100–114. http://dx.doi.org/10.1515/popets-2016-0007.
Der volle Inhalt der Quelleshabtai, Asaf, Dennis Potashnik, Yuval Fledel, Robert Moskovitch und Yuval Elovici. „Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content“. Security and Communication Networks 4, Nr. 8 (26.07.2010): 947–65. http://dx.doi.org/10.1002/sec.229.
Der volle Inhalt der QuelleTian, Zhao, Wei She, Shuang Li, You-Wei Wang, Wei Liu, Guang-Jun Zai, Li-Min Jia, Yong Qin und Hong-Hui Dong. „Key links identification for urban road traffic network based on temporal-spatial distribution of traffic congestion“. Modern Physics Letters B 33, Nr. 25 (10.09.2019): 1950307. http://dx.doi.org/10.1142/s021798491950307x.
Der volle Inhalt der QuelleDissertationen zum Thema "Analysis and filtering of network traffic"
Klečka, Jan. „Monitorovací sonda síťové komunikace“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442398.
Der volle Inhalt der QuelleLiu, Wei 1975. „Network traffic modelling and analysis“. Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82613.
Der volle Inhalt der QuelleThis thesis focuses on traffic modelling and analysis. A novel traffic model is proposed which can capture the traffic behaviours in all-photonic networks. The new model is based on a study of existing traffic modelling literature. It combines the time-varying Poisson model, gravity model and fractional Gaussian noise. This model can be used for the short-range traffic prediction. We examine Long-Range Dependence and test the time constancy of scaling parameters using the tools designed by Abry and Veitch, to analyze empirical and synthesized traffic traces.
Simhairi, Nather Zeki. „Traffic assignment and network analysis“. Thesis, Royal Holloway, University of London, 1987. http://repository.royalholloway.ac.uk/items/a3377f99-4ed8-4000-91f8-0384aed4a3c6/1/.
Der volle Inhalt der QuelleLiu, Jian. „Fractal Network Traffic Analysis with Applications“. Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11477.
Der volle Inhalt der QuelleJiang, Michael Zhonghua. „Analysis of wireless data network traffic“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0012/MQ61444.pdf.
Der volle Inhalt der QuelleHeller, Mark D. „Behavioral analysis of network flow traffic“. Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5108.
Der volle Inhalt der QuelleNetwork Behavior Analysis (NBA) is a technique to enhance network security by passively monitoring aggregate traffic patterns and noting unusual action or departures from normal operations. The analysis is typically performed offline, due to the huge volume of input data, in contrast to conventional intrusion prevention solutions based on deep packet inspection, signature detection, and real-time blocking. After establishing a benchmark for normal traffic, an NBA program monitors network activity and flags unknown, new, or unusual patterns that might indicate the presence of a potential threat. NBA also monitors and records trends in bandwidth and protocol use. Computer users in the Department of Defense (DoD) operational networks may use Hypertext Transport Protocol (HTTP) to stream video from multimedia sites like youtube.com, myspace.com, mtv.com, and blackplanet.com. Such streaming may hog bandwidth, a grave concern, given that increasing amounts of operational data are exchanged over the Global Information Grid, and introduce malicious viruses inadvertently. This thesis develops an NBA solution to identify and estimate the bandwidth usage of HTTP streaming video traffic entirely from flow records such as Cisco's NetFlow data.
Zhang, Yichi. „Residential Network Traffic and User Behavior Analysis“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-27001.
Der volle Inhalt der QuelleKreibich, Christian Peter. „Structural traffic analysis for network security monitoring“. Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613090.
Der volle Inhalt der QuelleYu, Han. „Analysis of network traffic in grid system“. Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/35162.
Der volle Inhalt der QuelleVu, Hong Linh. „DNS Traffic Analysis for Network-based Malware Detection“. Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93842.
Der volle Inhalt der QuelleBotnets betraktas som ett av de svåraste Internet-hoten idag. Botnets har använts vid många attacker mot multinationella organisationer och även nationella myndigheters och andra nationella Internet-tjänster. Allt eftersom mer effektiva detekterings - och skyddstekniker tas fram av säkerhetsforskare, har utvecklarna av botnets tagit fram nya tekniker för att undvika upptäckt. Därför är det inte förvånande att domännamnssystemet (Domain Name System, DNS) missbrukas av botnets för att undvika upptäckt, på grund av den viktiga roll domännamnssystemet har för Internets funktion - DNS ger en flexibel bindning mellan domännamn och IP-adresser. Domain-flux och fast-flux (även kallat IP-flux) är två relativt nya tekniker som används för att undvika spårning och svartlistning av IP-adresser av botnet-skyddsmekanismer genom att snabbt förändra bindningen mellan namn och IP-adresser som används av botnets. I denna rapport används passiv DNS-analys för att utveckla en anomali-baserad teknik för detektering av botnets som använder sig av domain-flux eller fast-flux. Tekniken baseras på skapandet av en uppslagnings-graf och en fel-graf från insamlad DNS-traffik och bryter ned dessa grafer i kluster som har stark korrelation mellan de ingående domänerna, maskinerna, och IP-adresserna. DNSrelaterade egenskaper extraheras för varje kluster och används som indata till en klassifficeringsmodul för identiffiering av domain-flux och fast-flux botnets i nätet. Utvärdering av metoden genom experiment på insamlade traffikspår visar att den föreslagna tekniken lyckas upptäcka domain-flux botnets i traffiken. Genom att fokusera på DNS-information kompletterar den föreslagna tekniken andra tekniker för detektering av botnets genom traffikanalys.
Bücher zum Thema "Analysis and filtering of network traffic"
Peterson, William P. Heavy traffic analysis of a transportation network model. Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1994.
Den vollen Inhalt der Quelle findenCarrapatoso, E. Traffic analysis for various metropolitan area network topologies. Bradford: University of Bradford. Postgraduate School of Electrical and Electronic Engineering, 1985.
Den vollen Inhalt der Quelle findenKesidis, George. An introduction to communication network analysis. Hoboken, N.J: Wiley-Interscience, 2007.
Den vollen Inhalt der Quelle findenlibrary, Wiley online, Hrsg. An introduction to communication network analysis. Hoboken, N.J: Wiley-Interscience, 2007.
Den vollen Inhalt der Quelle findenWein, Lawrence M. Scheduling network of queues: Heavy traffic analysis of multistation network with controllable inputs. Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.
Den vollen Inhalt der Quelle findenB, Mišić Vojislav, Hrsg. Performance modeling and analysis of Bluetooth networks: Polling, scheduling, and traffic control. Boca Raton: Auerbach Publications, 2006.
Den vollen Inhalt der Quelle findenKesidis, George. A course on analysis of communication networks. Hoboken, N.J: John Wiley, 2007.
Den vollen Inhalt der Quelle findenDattatreya, G. R. Performance analysis of queuing and computer networks. Boca Raton: Chapman & Hall/CRC, 2008.
Den vollen Inhalt der Quelle findenDattatreya, G. R. Performance analysis of queuing and computer networks. Boca Raton: CRC Press/Taylor & Francis, 2008.
Den vollen Inhalt der Quelle findenYajuan, Deng, Hrsg. Lu wang huan jing xia gao su gong lu jiao tong shi gu ying xiang chuan bo fen xi yu kong zhi: Traffic accident impact analysis and control of expressway under road network. Beijing: Ke xue chu ban she, 2010.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Analysis and filtering of network traffic"
Pontarelli, Salvatore, und Simone Teofili. „Anti-evasion Technique for Packet Based Pre-filtering for Network Intrusion Detection Systems (Poster)“. In Traffic Monitoring and Analysis, 185–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20305-3_18.
Der volle Inhalt der QuelleGebali, Fayez. „Modeling Network Traffic“. In Analysis of Computer Networks, 445–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15657-6_15.
Der volle Inhalt der QuelleGebali, Fayez. „Modeling Network Traffic“. In Analysis of Computer and Communication Networks, 1–47. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74437-7_11.
Der volle Inhalt der QuelleSadiku, Matthew N. O., und Sarhan M. Musa. „Self-Similarity of Network Traffic“. In Performance Analysis of Computer Networks, 251–65. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01646-7_10.
Der volle Inhalt der QuelleSilva, João Marco C., und Solange Rito Lima. „Improving Network Measurement Efficiency through Multiadaptive Sampling“. In Traffic Monitoring and Analysis, 171–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28534-9_18.
Der volle Inhalt der QuelleStefanidis, Kostas, Eirini Ntoutsi, Haridimos Kondylakis und Yannis Velegrakis. „Social-Based Collaborative Filtering“. In Encyclopedia of Social Network Analysis and Mining, 2793–802. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_110171.
Der volle Inhalt der QuelleStefanidis, Kostas, Eirini Ntoutsi, Haridimos Kondylakis und Yannis Velegrakis. „Social-Based Collaborative Filtering“. In Encyclopedia of Social Network Analysis and Mining, 1–9. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_110171-1.
Der volle Inhalt der QuelleGiorgi, Giada, und Claudio Narduzzi. „Scaling Analysis of Wavelet Quantiles in Network Traffic“. In Traffic Monitoring and Analysis, 109–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01645-5_13.
Der volle Inhalt der QuelleRomirer-Maierhofer, Peter, Fabio Ricciato, Alessandro D’Alconzo, Robert Franzan und Wolfgang Karner. „Network-Wide Measurements of TCP RTT in 3G“. In Traffic Monitoring and Analysis, 17–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01645-5_3.
Der volle Inhalt der QuelleDainotti, Alberto, Antonio Pescapé und Carlo Sansone. „Early Classification of Network Traffic through Multi-classification“. In Traffic Monitoring and Analysis, 122–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20305-3_11.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Analysis and filtering of network traffic"
Del Fiore, Julian M., Pascal Merindol, Valerio Persico, Cristel Pelsser und Antonio Pescape. „Filtering the Noise to Reveal Inter-Domain Lies“. In 2019 Network Traffic Measurement and Analysis Conference (TMA). IEEE, 2019. http://dx.doi.org/10.23919/tma.2019.8784618.
Der volle Inhalt der QuelleLambruschini, P., M. Raggio, R. Bajpai und A. Sharma. „Optimized packet pre-filtering for analysis of IP traffic on high-speed networks“. In 2012 International Conference on Signals and Electronic Systems (ICSES 2012). IEEE, 2012. http://dx.doi.org/10.1109/icses.2012.6857541.
Der volle Inhalt der QuelleFouliras, Panayotis. „On RTP filtering for network traffic reduction“. In the 6th International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1497185.1497261.
Der volle Inhalt der QuelleKline, Erik, Alexander Afanasyev und Peter Reiher. „Shield: DoS filtering using traffic deflecting“. In 2011 19th IEEE International Conference on Network Protocols (ICNP). IEEE, 2011. http://dx.doi.org/10.1109/icnp.2011.6089077.
Der volle Inhalt der QuelleCerrato, I., M. Leogrande und F. Risso. „Filtering network traffic based on protocol encapsulation rules“. In 2013 International Conference on Computing, Networking and Communications (ICNC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iccnc.2013.6504238.
Der volle Inhalt der QuelleMontigny-leboeuf, Annie, und Tim Symchych. „Network Traffic Flow Analysis“. In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277589.
Der volle Inhalt der QuelleAbramov, Evgeny, Denis Mordvin und Oleg Makarevich. „Automated method for constructing of network traffic filtering rules“. In the 3rd international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1854099.1854141.
Der volle Inhalt der QuelleHeard, Nick, Patrick Rubin-Delanchy und Daniel J. Lawson. „Filtering Automated Polling Traffic in Computer Network Flow Data“. In 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC). IEEE, 2014. http://dx.doi.org/10.1109/jisic.2014.52.
Der volle Inhalt der QuelleMistry, Devang, Prasad Modi, Kaustubh Deokule, Aditi Patel, Harshagandha Patki und Omar Abuzaghleh. „Network traffic measurement and analysis“. In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2016. http://dx.doi.org/10.1109/lisat.2016.7494141.
Der volle Inhalt der QuelleLi, Guanyu, Menghao Zhang, Chang Liu, Xiao Kong, Ang Chen, Guofei Gu und Haixin Duan. „NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering“. In 2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 2019. http://dx.doi.org/10.1109/icnp.2019.8888057.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Analysis and filtering of network traffic"
Lakhina, Anukool, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk und Nina Taft. Structural Analysis of Network Traffic Flows. Fort Belvoir, VA: Defense Technical Information Center, November 2003. http://dx.doi.org/10.21236/ada439086.
Der volle Inhalt der QuelleLiu, Jyh-Charn. Progressive Email Classifier (PEC) for Ingress Enterprise Network Traffic Analysis. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada534227.
Der volle Inhalt der QuelleMcCulloh, Ian, Grace Garcia, Kelsey Tardieu, Jennifer MacGibbon, Heather Dye, Kerry Moores, John Graham und Daniel B. Horn. IkeNet: Social Network Analysis of E-mail Traffic in the Eisenhower Leadership Development Program. Fort Belvoir, VA: Defense Technical Information Center, November 2007. http://dx.doi.org/10.21236/ada475212.
Der volle Inhalt der QuelleDuvvuri, Sarvani, und Srinivas S. Pulugurtha. Researching Relationships between Truck Travel Time Performance Measures and On-Network and Off-Network Characteristics. Mineta Transportation Institute, Juli 2021. http://dx.doi.org/10.31979/mti.2021.1946.
Der volle Inhalt der QuelleKodupuganti, Swapneel R., Sonu Mathew und Srinivas S. Pulugurtha. Modeling Operational Performance of Urban Roads with Heterogeneous Traffic Conditions. Mineta Transportation Institute, Januar 2021. http://dx.doi.org/10.31979/mti.2021.1802.
Der volle Inhalt der QuelleAl Hosain, Nourah, und Alma Alhussaini. Evaluating Access to Riyadh’s Planned Public Transport System Using Geospatial Analysis. King Abdullah Petroleum Studies and Research Center, Juni 2021. http://dx.doi.org/10.30573/ks--2021-dp10.
Der volle Inhalt der Quelle