Detection and classification of peer-to-peer traffic: A survey

JV Gomes, PRM Inácio, M Pereira, MM Freire… - ACM Computing …, 2013 - dl.acm.org
The emergence of new Internet paradigms has changed the common properties of network
data, increasing the bandwidth consumption and balancing traffic in both directions. These …

Transaction-level models for AMBA bus architecture using SystemC 2.0 [SOC applications]

M Caldari, M Conti, M Coppola… - … Automation and Test …, 2003 - ieeexplore.ieee.org
The concept of a SOC platform architecture introduces the concept of a communication
infrastructure. In the transaction-level, a finite set of architecture components (memories …

System and method for detecting peer-to-peer network software

SP Hopkins - US Patent 9,178,940, 2015 - Google Patents
The present invention provides a method for detecting whether or not a computer system is,
has, or can participate in a Peer-to-Peer network. Scanning software is executed on a target …

Identifying P2P traffic: A survey

M Bhatia, MK Rai - Peer-to-Peer Networking and Applications, 2017 - Springer
Abstract Peer-to-Peer (P2P) traffic is widely used for the purpose of streaming media, file-
sharing, instant messaging, games, software etc., which often involves copyrighted data …

Design and evaluation of a proxy cache for peer-to-peer traffic

M Hefeeda, CH Hsu… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Peer-to-peer (P2P) systems generate a major fraction of the current Internet traffic, and they
significantly increase the load on ISP networks and the cost of running and connecting …

Connection management in peer-to-peer content distribution clouds

C Gkantsidis, J Miller, M Costa, PR Rodriguez… - US Patent …, 2010 - Google Patents
(57) ABSTRACT A topology management process is implemented which involves removing
or “tearing down” connections between nodes in certain situations in order to try to replace …

P2p traffic identification using cluster analysis

GPS Junior, JEB Maia, R Holanda… - 2007 First international …, 2007 - ieeexplore.ieee.org
In the last years, we have seen that the use of P2P applications has increased significantly
and currently they represent a signiflcant portion of the Internet traffic. In consequence of this …

Design and evaluation of deep packet inspection system: A case study

MY Liao, MY Luo, CS Yang, CH Chen, PC Wu… - IET networks, 2012 - IET
An increasing number of Internet applications and services render network management
more troublesome for bandwidth misuse and security concern. As a result, network traffic …

[图书][B] Introduction to network security

D Jacobson - 2008 - taylorfrancis.com
Unlike data communications of the past, today's networks consist of numerous devices that
handle the data as it passes from the sender to the receiver. However, security concerns are …

[PDF][PDF] Volume rendering of 3D scalar and vector fields at LLNL

R Crawfis, N Max, B Becker, B Cabral - Proceedings of the 1993 ACM …, 1993 - dl.acm.org
Simulation of complex 3-dimensional phenomena generate aizta sets which are hard to
comprehend using conventional 2-dimensionally oriented visualization tools. One way to …