


default search action
1st MineNet@SIGCOMM 2005: Philadelphia, Pennsylvania, USA
- Subhabrata Sen, Chuanyi Ji, Debanjan Saha, Joe McCloskey:

Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005. ACM 2005, ISBN 1-59593-026-4
Security and network problem determination
- Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama, Masahiro Ishino, Haruhiko Ohshima, Ichiro Mizukoshi:

Detecting mass-mailing worm infected hosts by mining DNS traffic data. 159-164 - Vijay Karamcheti, Davi Geiger, Zvi M. Kedem, S. Muthukrishnan:

Detecting malicious network traffic using inverse distributions of packet contents. 165-170 - Warren Harrop, Grenville J. Armitage:

Greynets: a definition and evaluation of sparsely populated darknets. 171-172 - Srikanth Kandula, Dina Katabi, Jean-Philippe Vasseur:

Shrink: a tool for failure diagnosis in IP networks. 173-178 - Ann Devitt

, Joseph Duffin, Robert Moloney:
Topographical proximity for mining network alarm data. 179-184
Traffic analysis and infrastructure monitoring
- Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John S. Heidemann, Christos Papadopoulos, Joseph A. Bannister:

Experiences with a continuous network tracing infrastructure. 185-190 - Neal Patwari, Alfred O. Hero III, Adam Pacholski:

Manifold learning visualization of network traffic data. 191-196 - Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang:

ACAS: automated construction of application signatures. 197-202 - Richard Mortier

, Rebecca Isaacs, Paul Barham:
Anemone: using end-systems as a rich network management platform. 203-204 - Min Cai, Jianping Pan

, Yu-Kwong Kwok, Kai Hwang:
Fast and accurate traffic matrix measurement using adaptive cardinality counting. 205-206
Routing & configuration management
- Kuai Xu

, Jaideep Chandrashekar, Zhi-Li Zhang:
A first step toward understanding inter-domain routing dynamics. 207-212 - Beichuan Zhang, Vamsi Kambhampati, Mohit Lad, Daniel Massey, Lixia Zhang:

Identifying BGP routing table transfers. 213-218 - Jian Zhang, Jennifer Rexford

, Joan Feigenbaum:
Learning-based anomaly detection in BGP updates. 219-220 - Khalid El-Arini, Kevin S. Killourhy:

Bayesian detection of router configuration anomalies. 221-222 - Sung-eok Jeon, Chuanyi Ji:

Role of machine learning in configuration management of ad hoc wireless networks. 223-224

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














