Clustering network traffic utilization
Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. This is for the case when a user intercepts the application from other proxy or dynamic port, then the bytes utilization can be manipulated. In this paper, we present a clustering...
Saved in:
Main Authors: | Mohd Khairudin, Nazli, Muda, Zaiton, Mustapha, Aida, Nagarathinam, Yogeswaran, Salleh, Mohd. Sidek |
---|---|
格式: | Article |
语言: | English |
出版: |
Praise Worthy Prize
2013
|
在线阅读: | http://psasir.upm.edu.my/id/eprint/30577/1/Clustering%20network%20traffic%20utilization.pdf http://psasir.upm.edu.my/id/eprint/30577/ |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
Data mining in network traffic using fuzzy clustering
由: Mohamad, Shamsul
出版: (2003) -
Data mining in network traffic using fuzzy clustering
由: Mohamad, Shamsul
出版: (2003) -
Distinguishing automata machine by using UPPAAL as a model checker
由: Nagarathinam, Yogeswaran, et al.
出版: (2014) -
Traffic Utilization on Internet Application: Trends and Impact in Student Wireless Network
由: Noraniah, Abdul Aziz, et al.
出版: (2014) -
Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks
由: Qureshi, Kashif Naseer, et al.
出版: (2018)