Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference41 articles.
1. Han, C.-K., & Choi, H.-K. (2009). Effective discovery of attacks using entropy of packet dynamics. IEEE Network, 23, 5.
2. Androulidakis, G., Chatzigiannakis, V., & Papavassiliou, S. (2009). Network anomaly detection and classification via opportunistic sampling. IEEE Network, 23(1), 6–12.
3. Ranjan, S., et al. (2007). Dowitcher: Effective worm detection and containment in the internet core. In INFOCOM 2007. 26th IEEE international conference on computer communications. IEEE.
4. Eckhoff, D., & Christoph, S. (2012). A multi-channel IEEE 1609.4 and 802.11 p EDCA model for the veins framework. In Proceedings of 5th ACM/ICST international conference on simulation tools and techniques for communications, networks and systems: 5th ACM/ICST international workshop on OMNet++. (Desenzano, Italy). OMNeT.
5. Hohn, N., & Veitch, D. (2003). Inverting sampled traffic. In Proceedings of 3rd ACM SIGCOMM conference on Internet measurement. Miami Beach, Florida, USA.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献