Author:
Cheng Bo-Chao,Chen Huan,Tseng Ryh-Yuh
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Industrial and Manufacturing Engineering,Software
Reference9 articles.
1. Casey E. (2004) Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs. Digital Investigation 1(1): 28–43
2. Corey V., Peterman C., Shearin S., Greenberg M.S., Bokkelen J.V. (2002) Network forensics analysis. IEEE Internet Computing 6(6): 60–66
3. Feng, W., Kandlur, D., Saha, D., & Shin, K. (1999). Blue: A new class of active queue management algorithms. Technical Report CSE-TR-387-99, April, University of Michigan.
4. Hong D., Rapport S.S. (1986) Traffic model and performance analysis for cellular mobile radiotelephone systems with prioritized and non-prioritized handoff procedures. IEEE Transactions on Vehicular Technology 35: 77–92
5. Jamjoom, H., & Shin, K. (2003). Persistent dropping: An efficient control of traffic aggregates. In Proceedings of ACM SIGCOMM ’03, August (pp. 287–297). Karlsruhe, German.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献