Deep packet inspection

Results: 1581



#Item
261Fault-tolerant computer systems / K-means clustering / Cluster analysis / Deep packet inspection / Computer cluster / Statistical classification / Traffic classification / Statistics / Computing / Machine learning

SELF-LEARNING CLASSIFIER FOR INTERNET TRAFFIC LUIGI GRIMAUDO*, MARCO MELLIA*, ELENA BARALIS* AND RAM KERALAPURA⌃ *Politecnico di Torino

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-23 09:42:45
262Network performance / Streaming / Computer networking / Transmission Control Protocol / Traffic flow / Network congestion / Packet loss / Deep packet inspection / General Packet Radio Service / Computing / Network architecture / OSI protocols

Comparison of Caching Strategies in Modern Cellular Backhaul Networks Shinae Woo Eunyoung Jeong

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2015-02-24 22:17:59
263Technology / Computing / Electronic engineering / Cisco Systems / Deep packet inspection / Videotelephony

Debate Session V Helping Operators Boost Profitability from Mobile Services Copyright 2011 IDC. Reproduction is forbidden unless authorized. All rights reserved.

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2013-01-23 12:03:26
264Cyberwarfare / Internet security / Firewall / Deep packet inspection / Content-control software / Content filtering / Internet / Malware / World Wide Web / Computer network security / Computing / Computer security

8 Essentials of Internet Security Today’s Internet is about much more than simple web browsing, which means total Internet security requires much more than basic firewalls and content

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2010-04-12 14:12:06
265USENIX Annual Technical Conference / USENIX / System software / Internet censorship / Deep packet inspection / Citizen Lab / International Computer Science Institute / Information technology management / Computer network security / Computing / System administration

Announcement and Call for Papers www.usenix.org/foci15/cfp 5th USENIX Workshop on Free and Open Communications

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-04 22:53:29
266Computing / Voice over IP / Electronic engineering / Network performance / Network architecture / Deep packet inspection / Computer network security / Broadband

PDF Document

Add to Reading List

Source URL: www.lextel.com

Language: English - Date: 2013-01-25 15:57:35
267Deep packet inspection / Videotelephony / Strategic management / Patent / Business / Computing / Electronic engineering / Patent visualisation / Management / Intellectual property law / Cisco Systems

Applying IP Business Intelligence using a Maturity Model Framework Catherine Duck Lafrenz and Shauna Osborne March 2015 Table of Contents

Add to Reading List

Source URL: www.infonortics.com

Language: English - Date: 2015-03-21 05:08:57
268Internet protocols / Computer network security / Internet standards / Streaming / OSI protocols / Deep packet inspection / Skype protocol / Communications protocol / Transmission Control Protocol / Computing / Network architecture / Data

nDPI: Open-Source High-Speed
 Deep Packet Inspection Luca Deri *†, Maurizio Martinelli*, Alfredo Cardigliano† IIT/CNR* ntop† Pisa, Italy

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2015-01-21 03:43:32
269Deep packet inspection / Computing / Cisco Unified Communications Manager / Electronics / Unified communications / Cisco Career Certifications / Cisco IOS / Videotelephony / Electronic engineering / Cisco Systems

CIPTUG Vendor Member 911 Enable Completes Cisco Interoperability Verification Testing with Cisco Developer Network Montreal, QC – July 16, 2013 – To take advantage of the benefits of the expanding role of the network

Add to Reading List

Source URL: www.ciptug.org

Language: English - Date: 2014-02-01 16:29:50
270Computing / Information / Data / Robust random early detection / Iperf / Deep packet inspection / Network packet / Denial-of-service attack / Sliding window protocol / Computer network security / Network performance / Denial-of-service attacks

C:/Users/Gautam/Desktop/JournalRevision/Thatte_JRNL_twoColumn_revision.dvi

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2013-05-17 18:59:37
UPDATE