Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
SNMP,SNMPV2,Snmpv3,and RMON 1 and 2
SNMP,SNMPV2,Snmpv3,and RMON 1 and 2
The OSU Flow-tools Package and CISCO NetFlow Logs
LISA '00 Proceedings of the 14th USENIX conference on System administration
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
LISA '00 Proceedings of the 14th USENIX conference on System administration
A parameterizable methodology for Internet traffic flow profiling
IEEE Journal on Selected Areas in Communications
A methodology for estimating interdomain web traffic demand
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
A methodology for studying persistency aspects of internet flows
ACM SIGCOMM Computer Communication Review
Observations on Cisco sampled NetFlow
ACM SIGMETRICS Performance Evaluation Review - Special issue on the First ACM SIGMETRICS Workshop on Large Scale Network Inference (LSNI 2005)
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Uncovering Artifacts of Flow Measurement Tools
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Traffic monitor deployment in IP networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fine-grained traffic classification with netflow data
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Peeling away timing error in netflow data
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Characterization of the busy-hour traffic of IP networks based on their intrinsic features
Computer Networks: The International Journal of Computer and Telecommunications Networking
Machine learning approach for IP-flow record anomaly detection
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Efficient distributed signature analysis
AIMS'11 Proceedings of the 5th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services
Improving the efficiency of misuse detection
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Increasing data center network visibility with cisco NetFlow-Lite
Proceedings of the 7th International Conference on Network and Services Management
Cooperative traffic management for video streaming overlays
Computer Networks: The International Journal of Computer and Telecommunications Networking
Measurement artifacts in netflow data
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
A scalable network forensics mechanism for stealthy self-propagating attacks
Computer Communications
Hi-index | 0.00 |