A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

Development of interval based methods for fuzziness in continuum-mechanics

RL Muhanna, RL Mullen - … and Annual Conference of the North …, 1995 - ieeexplore.ieee.org
Accounting for uncertainties in mechanics problems has previously been accomplished by
probabilistic methods. Such methods can require highly repetitive computations to analyze …

Detecting anomaly traffic using flow data in the real voip network

H Son, Y Lee - 2010 10th IEEE/IPSJ International Symposium …, 2010 - ieeexplore.ieee.org
As wireless LANs as well as the high-speed broadband Internet service are widely
deployed, the VoIP service has become popular. Generally, a lot of commercial VoIP …

VoIP profiler: profiling voice over IP user communication behavior

S Batthalla, M Swarnkar, N Hubballi… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Understanding the user behavior in Voice over IP (VoIP) communication has twofold
advantages. It helps in detecting anomalies and also helps in planning VoIP infrastructure …

Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation

R Farley, X Wang - International journal of critical infrastructure protection, 2014 - Elsevier
As increasing numbers of people run VoIP softphones on their laptops and smartphones,
vulnerabilities in VoIP protocols and systems introduce new threats to the computer systems …

Performance analysis of LAN, MAN, WAN, and WLAN topologies for VoIP services using OPNET modeler

P Chakraborty, AM Telgote - Computing, Communication and Signal …, 2019 - Springer
Visual and Vocal communication can be transferred through Circuit switched Network or
Packet Switched Network. Public Switched Telephone Network (PSTN) is not an affordable …

Research on VoIP traffic detection

MMU Rathore, T Mehmood - 2012 International Symposium on …, 2012 - ieeexplore.ieee.org
VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the
traditional telephone network and its compatibility with public switched telephone network …

Performance analysis of VoIP under the effect of interference and during conference call in WLAN network using OPNET modeller

P Chakraborty, A Telgote - International Journal of …, 2018 - inderscienceonline.com
Circuit switched network or packet switched networks are used for both visual and vocal
communication. Public switched telephone network (PSTN) is not an affordable option when …

Network security monitoring and analysis based on big data technologies

B Li - 2013 - scholarworks.unr.edu
Network flow data provide valuable information to understand the network state and to be
aware of the network security threats. However, processing the large amount of data …

VoIP 이상트래픽의플로우기반탐지방법

손현구, 이영석 - 정보과학회논문지: 정보통신, 2010 - dbpia.co.kr
SIP 와 RTP 를 기반으로 한 인터넷 전화 서비스가 널리 보급되고 있다. 이와 함께 VoIP
전화연결 지연, 방해, 종료 및 음성 통화 품질 감소 등의 피해를 주는 VoIP 이상 트래픽들이 …