48 results on '"NetFlow"'
Search Results
2. NTFA: Network Flow Aggregator
3. Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data
4. A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks
5. Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity
6. A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention
7. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks
8. Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists
9. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems
10. Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification
11. Privacy as a Service: Anonymisation of NetFlow Traces
12. The Impact of the Observation Period for Detecting P2P Botnets on the Real Traffic Using BotCluster
13. The Implementation of NetFlow Log System Using Ceph and ELK Stack
14. Sparse Autoencoders for Unsupervised Netflow Data Classification
15. Detection and Identification of Events
16. NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series
17. Netflow-Based Malware Detection and Data Visualisation System
18. A Fine-Grained Large-Scale NAT Detection Method
19. System Responsive to ICT Security Incidents in the LAN
20. Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic
21. How Dangerous Is Internet Scanning? : A Measurement Study of the Aftermath of an Internet-Wide Scan
22. Data Plane
23. Effective Network Management
24. Entropy-Based Internet Traffic Anomaly Detection: A Case Study
25. Network Anomaly Detection Using Parameterized Entropy
26. NNSDS: Network Nodes’ Social Attributes Discovery System Based on Netflow
27. Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow
28. Anomaly Detection and Mitigation at Internet Scale: A Survey
29. Measurement Artifacts in NetFlow Data
30. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis
31. Packet and Flow Based Network Intrusion Dataset
32. Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation
33. NetFlow Based Network Protection
34. Application Layer Protocol Identification Algorithm Design
35. Flow Information Storage Assessment Using IPFIXcol
36. Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms
37. Towards Efficient Flow Sampling Technique for Anomaly Detection
38. BotSpot: Anonymous and Distributed Malware Detection
39. Statistical Model Applied to NetFlow for Network Intrusion Detection
40. Implementation of a Stream-Based IP Flow Record Query Language
41. Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases
42. Design of a Stream-Based IP Flow Record Query Language
43. Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism
44. Visualization of Node Interaction Dynamics in Network Traces
45. Design of an IP Flow Record Query Language
46. A Proposal of Large-Scale Traffic Monitoring System Using Flow Concentrators
47. Tracing Denial of Service Origin: Ant Colony Approach
48. Situational Awareness and Network Traffic Analysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.