<--- Back to Details
First PageDocument Content
Algebraic graph theory / Network analysis / Networks / Graph / Vertex / Centrality / Clustering coefficient / Directed graph / Social network analysis software / Graph theory / Mathematics / Network theory
Date: 2014-09-29 11:42:14
Algebraic graph theory
Network analysis
Networks
Graph
Vertex
Centrality
Clustering coefficient
Directed graph
Social network analysis software
Graph theory
Mathematics
Network theory

Web Mining Pajek Oliver Lehmberg FSS 2014

Add to Reading List

Source URL: dws.informatik.uni-mannheim.de

Download Document from Source Website

File Size: 1.012,34 KB

Share Document on Facebook

Similar Documents

Computing / Information and communications technology / Computer networking / Data transmission / Network performance / Internet architecture / Teletraffic / Telecommunications engineering / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

DocID: 1xVHd - View Document

Computing / Information and communications technology / Data transmission / Computer networking / Network performance / Routing / Internet architecture / Teletraffic / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

DocID: 1xVuF - View Document

Computing / Data transmission / Network architecture / Computer networking / Network protocols / Emerging technologies / Internet architecture / OpenFlow / Software-defined networking / Traffic flow / NetFlow / Denial-of-service attack

iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland Meier

DocID: 1xUBt - View Document

Computing / Data transmission / Network architecture / Computer networking / Network protocols / Emerging technologies / Internet architecture / OpenFlow / Software-defined networking / Traffic flow / NetFlow / Denial-of-service attack

iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland Meier

DocID: 1xTNw - View Document

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

DocID: 1xTnc - View Document