Towards Dynamic Controller Placement in Software Defined Vehicular Networks. | 2 | 0.37 | 2020 |
Experimental Estimation of LTE-A Performance | 0 | 0.34 | 2019 |
Evaluating the Impact of Traffic Sampling onAATAC's DDoS Detection. | 0 | 0.34 | 2019 |
Autobot: An Emulation Environment For Cellular Vehicular Communications | 0 | 0.34 | 2019 |
Cellular Uplink Bandwidth Prediction Based on Radio Measurements | 0 | 0.34 | 2019 |
Effective Prediction of V2I Link Lifetime and Vehicle's Next Cell for Software Defined Vehicular Networks: A Machine Learning Approach | 0 | 0.34 | 2019 |
Rethinking IXPs' Architecture in the Age of SDN. | 2 | 0.38 | 2018 |
OpenFlow based Topology Discovery Service in Software Defined Vehicular Networks: limitations and future approaches | 1 | 0.35 | 2018 |
Evaluating the Impact of Traffic Sampling on AATAC's DDoS Detection. | 0 | 0.34 | 2018 |
Integrating Short History for Improving Clustering Based Network Traffic Anomaly Detection | 0 | 0.34 | 2017 |
Online and Scalable Unsupervised Network Anomaly Detection Method | 15 | 0.73 | 2017 |
A lightweight snapshot-based DDoS detector | 2 | 0.40 | 2017 |
An SDN hybrid architecture for vehicular networks: Application to Intelligent Transport System. | 0 | 0.34 | 2017 |
Cross Fertilization Between Wireless Testbeds and NS-3 Simulation Models. | 0 | 0.34 | 2017 |
ENDEAVOUR: A Scalable SDN Architecture For Real-World IXPs. | 4 | 0.40 | 2017 |
Inter-domain networking innovation on steroids: empowering ixps with SDN capabilities. | 8 | 0.65 | 2016 |
OpenFlow-based migration and management of the TouIX IXP. | 1 | 0.38 | 2016 |
Guest Editors' Introduction: Special Issue on Big Data Analytics for Management. | 0 | 0.34 | 2016 |
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection | 9 | 0.53 | 2015 |
Unsupervised Network Anomaly Detection in Real-Time on Big Data | 4 | 0.44 | 2015 |
Predictive Estimation of Wireless Link Performance from Medium Physical Parameters Using Support Vector Regression and k-Nearest Neighbors. | 2 | 0.52 | 2014 |
Coping with 0-day attacks through Unsupervised Network Intrusion Detection | 2 | 0.37 | 2014 |
Architecture for an open source network tester | 0 | 0.34 | 2013 |
Assessment and event based analysis of dynamic wireless networks | 1 | 0.36 | 2013 |
Network and Service Management for Cloud Computing and Data Centers: A Report on CNSM 2012 | 1 | 0.35 | 2013 |
Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge | 28 | 0.97 | 2012 |
Managing the upcoming ubiquitous computing | 0 | 0.34 | 2012 |
Knowledge-independent traffic monitoring: Unsupervised detection of network attacks | 5 | 0.49 | 2012 |
Risk assessment for airworthiness security | 2 | 0.41 | 2012 |
UNADA: unsupervised network anomaly detection using sub-space outliers ranking | 15 | 0.72 | 2011 |
On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification | 0 | 0.34 | 2011 |
oBGP: an overlay for a scalable iBGP control plane | 5 | 0.51 | 2011 |
Sub-space clustering, inter-clustering results association & anomaly correlation for unsupervised network anomaly detection | 14 | 0.73 | 2011 |
Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks. | 4 | 0.41 | 2011 |
First step in cross-layers measurement in wireless networks: how to adapt to resource constraints for optimizing end-to-end services? | 0 | 0.34 | 2011 |
sub-space clustering and evidence accumulation for unsupervised network anomaly detection | 6 | 0.45 | 2011 |
MINETRAC: Mining flows for unsupervised analysis & semi-supervised classification | 12 | 0.92 | 2011 |
On the impact of monitoring router energy consumption for greening the Internet | 12 | 0.82 | 2010 |
Preface To Special Issue On 'Traffic Monitoring And Network Measurements: From Theory To Practice' | 0 | 0.34 | 2010 |
Assessing the accuracy of using aggregated traffic traces in network engineering | 4 | 0.48 | 2010 |
An efficient and lightweight method for Service Level Agreement assessment | 8 | 0.71 | 2010 |
Luth: Composing and Parallelizing Midpoint Inspection Devices | 1 | 0.36 | 2010 |
0day anomaly detection made possible thanks to machine learning | 3 | 0.46 | 2010 |
Rethinking iBGP routing | 0 | 0.34 | 2010 |
A database of anomalous traffic for assessing profile based IDS | 5 | 0.60 | 2010 |
Automated Classification of Network Traffic Anomalies. | 17 | 0.87 | 2009 |
Traffic Monitoring and Analysis, First International Workshop, TMA 2009, Aachen, Germany, May 11, 2009. Proceedings | 15 | 1.66 | 2009 |
LaasNetExp: a generic polymorphic platform for network emulation and experiments | 9 | 0.60 | 2008 |
The CoNEXT shadow TPC | 0 | 0.34 | 2008 |
Internet attacks monitoring with dynamic connection redirection mechanisms | 4 | 0.50 | 2008 |