Using Deep Packet Inspection in CyberTraffic Analysis | 1 | 0.43 | 2021 |
Suspicious Network Event Recognition Leveraging On Machine Learning | 0 | 0.34 | 2019 |
Combining System Visibility and Security Using eBPF. | 0 | 0.34 | 2019 |
Roaring Bitmaps: Implementation of an Optimized Software Library. | 4 | 0.43 | 2018 |
Implementing Web Classification for TLDs. | 0 | 0.34 | 2015 |
Large Scale Web-Content Classification. | 0 | 0.34 | 2015 |
Realtime high-speed network traffic monitoring using ntopng | 1 | 0.39 | 2014 |
MicroCloud-based network traffic monitoring | 3 | 0.45 | 2013 |
10 Gbit line rate packet-to-disk using n2disk | 11 | 0.73 | 2013 |
Indexing million of packets per second using GPUs | 12 | 0.64 | 2013 |
Realtime Microcloud-Based Flow Aggregation For Fixed And Mobile Networks | 3 | 0.44 | 2013 |
Exploiting DNS traffic to rank internet domains | 3 | 0.41 | 2013 |
Deep Packet Inspection on Commodity Hardware using FastFlow. | 3 | 0.52 | 2013 |
Graph Theoretical Models Of Dns Traffic | 2 | 0.40 | 2013 |
tsdb: a compressed database for time series | 3 | 0.41 | 2012 |
A distributed DNS traffic monitoring system | 4 | 0.62 | 2012 |
Towards a passive DNS monitoring system | 4 | 0.50 | 2012 |
pcapIndex: an index for network packet traces with legacy compatibility | 8 | 0.63 | 2012 |
Network Monitoring on Multicores with Algorithmic Skeletons. | 7 | 0.69 | 2011 |
Increasing data center network visibility with cisco NetFlow-Lite | 4 | 0.52 | 2011 |
vPF_RING: towards wire-speed network monitoring using virtual machines | 12 | 1.21 | 2011 |
High speed network traffic analysis with commodity multi-core systems | 86 | 5.01 | 2010 |
Collection and exploration of large data monitoring sets using bitmap databases | 5 | 0.52 | 2010 |
Enabling high-speed and extensible real-time communications monitoring | 8 | 1.09 | 2009 |
N2N: A Layer Two Peer-to-Peer VPN | 20 | 1.33 | 2008 |
High-Speed Dynamic Packet Filtering | 15 | 1.02 | 2007 |
Implications of the topological properties of Internet traffic on traffic engineering | 13 | 1.12 | 2004 |
Categorizing Computing Assets According to Communication Patterns | 2 | 0.40 | 2002 |
Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings | 0 | 0.34 | 2002 |
Beyond the Web: Mobile WAP-Based Management | 2 | 0.49 | 2001 |
Java-based mobile asset location | 0 | 0.34 | 2001 |
practical network security: experiences with ntop | 3 | 0.49 | 2000 |
Desktop versus web-based network management | 0 | 0.34 | 1999 |
Desktop-Based Network Management | 0 | 0.34 | 1999 |
Ntop: Beyond ping and traceroute | 13 | 0.91 | 1999 |
Rapid Network Management Application Development | 0 | 0.34 | 1997 |
Enabling mobile network managers | 2 | 0.42 | 1997 |
VRML: Adding 3D to Network Management | 3 | 1.05 | 1997 |
Network management using Internet technologies | 21 | 2.71 | 1997 |
Static vs. Dynamic CMIP/SNMP Network Management Using CORBA | 5 | 1.36 | 1997 |
An object-oriented approach to the implementation of OSI management | 4 | 0.75 | 1995 |
Secure Remote Management in the ESPRIT MIDAS Project | 5 | 1.84 | 1994 |