Search

Your search keyword '"NetFlow"' showing total 680 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
680 results on '"NetFlow"'

Search Results

1. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

2. Detecting DNS hijacking by using NetFlow data

3. A personalized approach for communicating found anomalies in Netflow data to end-users

4. A personalized approach for communicating found anomalies in Netflow data to end-users

5. Design And Implementation Of Network Collector

6. Design And Implementation Of Network Collector

7. Design And Implementation Of Network Collector

8. Design And Implementation Of Network Collector

9. Design And Implementation Of Network Collector

10. Design And Implementation Of Network Collector

11. Opening Pandora’s Box: Charting the ecosystem of Command and Control infrastructures in a terabit-scale network

12. Opening Pandora’s Box: Charting the ecosystem of Command and Control infrastructures in a terabit-scale network

13. Detection of Bitcoin miners from network measurements

14. Detection, classification and visualization of anomalies using generalized entropy metrics

15. Detection, classification and visualization of anomalies using generalized entropy metrics

16. UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red

17. UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red

18. UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red

19. UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red

20. UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red

21. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

22. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

23. BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows

24. Learning Finite Automata via Flexible State-Merging and Applications in Networking

25. BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows

26. Learning Finite Automata via Flexible State-Merging and Applications in Networking

27. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

28. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

30. Network traffic classification using Apache Spark

31. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis

32. Protokol NetFlow v hybridní infrastruktuře

33. Detection of malware traffic with NetFlow

34. Исследование методов сбора статистических данных о трафике в IP-сетях передачи данных

35. Efficient Learning of Communication Profiles from IP Flow Records

36. En stabs nätverkstrafik : En analys av användningen av datornätverkskapacitet i en operativ stab under övningen VIKING 11

38. Visualización de datos de red

39. En stabs nätverkstrafik : En analys av användningen av datornätverkskapacitet i en operativ stab under övningen VIKING 11

40. Medición eficiente del rendimiento de internet: análisis de la estimación del delay por flow

41. Despliegue de herramientas de gestión y monitorización para centros de operación de redes IP

42. Algorithms and estimators for summarization of unaggregated data streams

43. Algorithms and estimators for summarization of unaggregated data streams

44. Flow-based Brute-force Attack Detection

45. Monitorización de tráfico y encaminamiento en redes IP

46. Monitorización de tráfico y encaminamiento en redes IP

47. Monitorización de tráfico y encaminamiento en redes IP

48. An Analysis of Network Flow Records for Inferring Web Browser Redirection

49. Flow-based Brute-force Attack Detection

50. Flow-based Brute-force Attack Detection

Catalog

Books, media, physical & digital resources