Author:
Iliofotou Marios,Kim Hyun-chul,Faloutsos Michalis,Mitzenmacher Michael,Pappu Prashanth,Varghese George
Subject
Computer Networks and Communications
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mapping the Evolution and Future Trajectories of Network Mining: A Scientometric Analysis (2004–2023);2024 International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM);2024-06-19
2. Intelligent Detection and Analysis Techniques for Botnet Malicious Traffic;Proceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications;2024-06-07
3. Mercury: A High-Performance Streaming Graph Method for Broad and Deep Flow Inspection;2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta);2022-12
4. GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection;Security and Communication Networks;2022-01-22
5. A Survey of techniques for fine-grained web traffic identification and classification;Mathematical Biosciences and Engineering;2022