Search

Your search keyword '"NetFlow"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "NetFlow" Remove constraint Descriptor: "NetFlow" Publisher springer nature Remove constraint Publisher: springer nature
23 results on '"NetFlow"'

Search Results

1. A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection.

2. Methods and High-performance Tools for Collecting, Analysis and Visualization of Data Exchange with a Focus on Research and Education Telecommunications Networks.

3. Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.

4. An approach to application-layer DoS detection.

5. Towards a Standard Feature Set for Network Intrusion Detection System Datasets.

6. Detection of illicit cryptomining using network metadata.

7. SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification.

8. Collection, Analysis and Interactive Visualization of NetFlow Data: Experience with Big Data on the Base of the National Research Computer Network of Russia.

9. Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow.

10. Flow-Based Network Management: A Report from the IRTF NMRG Workshop.

11. Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases.

12. BotSpot: Anonymous and Distributed Malware Detection.

13. Statistical Model Applied to NetFlow for Network Intrusion Detection.

14. Implementation of a Stream-Based IP Flow Record Query Language.

15. Visualization of Node Interaction Dynamics in Network Traces.

16. Design of a Stream-Based IP Flow Record Query Language.

17. Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism.

18. Design of an IP Flow Record Query Language.

19. Flow-inspector: a framework for visualizing network flow data using current web technologies.

20. Visualizing big network traffic data using frequent pattern mining and hypergraphs.

21. Report of the Third Workshop on the Usage of NetFlow/IPFIX in Network Management.

22. Report of the Second Workshop on the Usage of NetFlow/IPFIX in Network Management.

23. Using NetFlow/IPFIX for Network Management.

Catalog

Books, media, physical & digital resources