[PDF][PDF] P2P 流量识别

鲁刚, 张宏莉, 叶麟 - 软件学报, 2011 - jos.org.cn
P2P 流量识别 Page 1 软件学报ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2011,22(6):1281-1298 [doi: 10.3724/SP.J.1001.2011.03995] http://www.jos.org.cn …

[HTML][HTML] Network traffic identification in packet sampling environment

S Dong, Y Xia - Digital communications and networks, 2023 - Elsevier
With the rapid growth of network bandwidth, traffic identification is currently an important
challenge for network management and security. In recent years, packet sampling has been …

Trends and differences in connection-behavior within classes of internet backbone traffic

W John, S Tafvelin, T Olovsson - … , PAM 2008, Cleveland, OH, USA, April …, 2008 - Springer
In order to reveal the influence of different traffic classes on the Internet, backbone traffic was
collected within an eight month period on backbone links of the Swedish University Network …

Scalability of information centric networking using mediated topology management

BA Alzahrani, MJ Reed, J Riihijärvi… - Journal of Network and …, 2015 - Elsevier
Abstract Information centric networking is a new concept that places emphasis on the
information items themselves rather than on where the information items are stored …

Empirical analysis and modeling of peer-to-peer traffic flows

M Pustisek, I Humar, J Bester - MELECON 2008-The 14th IEEE …, 2008 - ieeexplore.ieee.org
This study presents a detailed flow-level empirical analysis of Peer-to-peer traffic. It is based
on 24 hours long traffic traces that were collected on a backbone link in academic …

Enforcing privacy through usage-controlled video surveillance

P Birnstill, A Pretschner - 2013 10th IEEE International …, 2013 - ieeexplore.ieee.org
Increasing capabilities of intelligent video surveillance systems require the enforcement of
privacy-related requirements. Data usage control technologies offer appropriate solutions in …

A traffic identification based on PSO-RBF neural network in peer-to-peer network

Y Chen, H Ji, H Liu, L Sun - International Journal of …, 2016 - inderscienceonline.com
To identify and control the peer-to-peer (P2P) traffic accurately, this paper proposes a novel
classification method of peer-to-peer network traffic identification based on machine …

TCFOM: a robust traffic classification framework based on OC-SVM combined with MC-SVM

G Lu, H Zhang, X Sha, C Chen… - … on Communications and …, 2010 - ieeexplore.ieee.org
New application traffic occurring on Internet frequently challenges the traditional traffic
classifiers based on machine learning. These classifiers always identify it inaccurately and …

[PDF][PDF] Differences between in-and outbound internet backbone traffic

W John, S Tafvelin - TERENA Networking Conference (TNC), 2007 - sjalander.com
Contemporary backbone-traffic is analyzed with respect to behaviour differences between
inbound and outbound Internet traffic. For the analysis, 146 traffic traces of 20 minutes …

High performance flow feature extraction with multi-core processors

S Li, Y Luo - 2010 IEEE Fifth International Conference on …, 2010 - ieeexplore.ieee.org
Next generation networks anticipate an increasing amount of network traffic from a wide
range of emerging network applications. The features of packet flows (such as the minimal …