Author of the publication

Reviewing Traffic Classification.

, , , , , and . Data Traffic Monitoring and Analysis, volume 7754 of Lecture Notes in Computer Science, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing ISP Network Energy Cost: Formulation and Solutions., , and . IEEE/ACM Trans. Netw., 20 (2): 463-476 (2012)NetCluster: A Clustering-Based Framework for Internet Tomography., , , , and . ICC, page 1-5. IEEE, (2009)Empirical assessment of VoIP overload detection tests., , and . NGI, page 1-8. IEEE, (2010)Analysis of call blocking probability in TDM/WDM networks with transparency constraint., , , and . IEEE Communications Letters, 4 (3): 104-106 (2000)On the stability of input-queued switches with speed-up., , , and . IEEE/ACM Trans. Netw., 9 (1): 104-118 (2001)A Survey on Big Data for Network Traffic Monitoring and Analysis., , , , and . CoRR, (2020)EXPLAIN-IT: Towards Explainable AI for Unsupervised Network Traffic Analysis., , and . CoRR, (2020)The quest for bandwidth estimation techniques for large-scale distributed systems., , and . SIGMETRICS Perform. Evaluation Rev., 37 (3): 20-25 (2009)Detecting malicious activities with user-agent-based profiles., , , , , , and . Int. J. Netw. Manag., 25 (5): 306-319 (2015)Five Years at the Edge: Watching Internet From the ISP Network., , , , and . IEEE/ACM Trans. Netw., 28 (2): 561-574 (2020)