Cargando…

Traffic Monitoring and Analysis Second International Workshop, TMA 2010, Zurich, Switzerland, April 7, 2010. Proceedings /

The Second International Workshop on Traffic Monitoring and Analysis (TMA 2010) was an initiative of the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (http:// www.tma-portal.eu/cost-tma-action). The COST progr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Ricciato, Fabio (Editor ), Mellia, Marco (Editor ), Biersack, Ernst (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Computer Communication Networks and Telecommunications, 6003
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Analysis of Internet Datasets
  • Understanding and Preparing for DNS Evolution
  • Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services
  • Mixing Biases: Structural Changes in the AS Topology Evolution
  • Tools for Traffic Analysis and Monitoring
  • EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network
  • A Database of Anomalous Traffic for Assessing Profile Based IDS
  • Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases
  • DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections
  • Traffic Classification
  • Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
  • Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
  • TCP Traffic Classification Using Markov Models
  • K-Dimensional Trees for Continuous Traffic Classification
  • Performance Measurements
  • Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays
  • End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
  • On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network.