Search

Your search keyword '"NetFlow"' showing total 48 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
48 results on '"NetFlow"'

Search Results

1. Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges

2. NTFA: Network Flow Aggregator

3. Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data

4. A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks

6. A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention

7. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks

8. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists

9. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems

10. Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification

11. Privacy as a Service: Anonymisation of NetFlow Traces

12. The Impact of the Observation Period for Detecting P2P Botnets on the Real Traffic Using BotCluster

13. The Implementation of NetFlow Log System Using Ceph and ELK Stack

14. Sparse Autoencoders for Unsupervised Netflow Data Classification

16. NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series

17. Netflow-Based Malware Detection and Data Visualisation System

20. Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic

21. How Dangerous Is Internet Scanning? : A Measurement Study of the Aftermath of an Internet-Wide Scan

22. Data Plane

25. Network Anomaly Detection Using Parameterized Entropy

26. NNSDS: Network Nodes’ Social Attributes Discovery System Based on Netflow

27. Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow

28. Anomaly Detection and Mitigation at Internet Scale: A Survey

29. Measurement Artifacts in NetFlow Data

30. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis

31. Packet and Flow Based Network Intrusion Dataset

33. NetFlow Based Network Protection

35. Flow Information Storage Assessment Using IPFIXcol

36. Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms

37. Towards Efficient Flow Sampling Technique for Anomaly Detection

39. Statistical Model Applied to NetFlow for Network Intrusion Detection

40. Implementation of a Stream-Based IP Flow Record Query Language

41. Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases

42. Design of a Stream-Based IP Flow Record Query Language

43. Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism

44. Visualization of Node Interaction Dynamics in Network Traces

45. Design of an IP Flow Record Query Language

46. A Proposal of Large-Scale Traffic Monitoring System Using Flow Concentrators

47. Tracing Denial of Service Origin: Ant Colony Approach

Catalog

Books, media, physical & digital resources