Abstract is missing.
- A three-tier IDS via data mining approachTsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee. 1-6 [doi]
- Identifying and tracking suspicious activities through IP gray space analysisYu Jin, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu. 7-12 [doi]
- Comparison of anomaly signal quality in common detection metricsDaniela Brauckhoff, Martin May, Bernhard Plattner. 13-16 [doi]
- Authentication anomaly detection: a case study on a virtual private networkMichael J. Chapple, Nitesh V. Chawla, Aaron Striegel. 17-22 [doi]
- Building a prototype for network measurement virtual observatoryPeter Matray, István Csabai, Péter Hága, József Steger, Laszlo Dobos, Gábor Vattay. 23-28 [doi]
- A markovian signature-based approach to IP traffic classificationHamza Dahmouni, Sandrine Vaton, David Rossé. 29-34 [doi]
- Byte me: a case for byte accuracy in traffic classificationJeffrey Erman, Anirban Mahanti, Martin F. Arlitt. 35-38 [doi]
- SIP-based VoIP traffic behavior profiling and its applicationsHun Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan, Antonio Nucci. 39-44 [doi]
- Real-time monitoring of SIP infrastructure using message classificationArup Acharya, Xiping Wang, Charles Wright, Nilanjan Banerjee, Bikram Sengupta. 45-50 [doi]