default search action
1st MineNet@SIGCOMM 2005: Philadelphia, Pennsylvania, USA
- Subhabrata Sen, Chuanyi Ji, Debanjan Saha, Joe McCloskey:
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005. ACM 2005, ISBN 1-59593-026-4
Security and network problem determination
- Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama, Masahiro Ishino, Haruhiko Ohshima, Ichiro Mizukoshi:
Detecting mass-mailing worm infected hosts by mining DNS traffic data. 159-164 - Vijay Karamcheti, Davi Geiger, Zvi M. Kedem, S. Muthukrishnan:
Detecting malicious network traffic using inverse distributions of packet contents. 165-170 - Warren Harrop, Grenville J. Armitage:
Greynets: a definition and evaluation of sparsely populated darknets. 171-172 - Srikanth Kandula, Dina Katabi, Jean-Philippe Vasseur:
Shrink: a tool for failure diagnosis in IP networks. 173-178 - Ann Devitt, Joseph Duffin, Robert Moloney:
Topographical proximity for mining network alarm data. 179-184
Traffic analysis and infrastructure monitoring
- Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John S. Heidemann, Christos Papadopoulos, Joseph A. Bannister:
Experiences with a continuous network tracing infrastructure. 185-190 - Neal Patwari, Alfred O. Hero III, Adam Pacholski:
Manifold learning visualization of network traffic data. 191-196 - Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang:
ACAS: automated construction of application signatures. 197-202 - Richard Mortier, Rebecca Isaacs, Paul Barham:
Anemone: using end-systems as a rich network management platform. 203-204 - Min Cai, Jianping Pan, Yu-Kwong Kwok, Kai Hwang:
Fast and accurate traffic matrix measurement using adaptive cardinality counting. 205-206
Routing & configuration management
- Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang:
A first step toward understanding inter-domain routing dynamics. 207-212 - Beichuan Zhang, Vamsi Kambhampati, Mohit Lad, Daniel Massey, Lixia Zhang:
Identifying BGP routing table transfers. 213-218 - Jian Zhang, Jennifer Rexford, Joan Feigenbaum:
Learning-based anomaly detection in BGP updates. 219-220 - Khalid El-Arini, Kevin S. Killourhy:
Bayesian detection of router configuration anomalies. 221-222 - Sung-eok Jeon, Chuanyi Ji:
Role of machine learning in configuration management of ad hoc wireless networks. 223-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.