Back to Results
First PageMeta Content
Data / Computer network security / Network performance / Pcap / Router / Traffic classification / Traffic flow / Netflow / Cisco Systems / Computing / Software / Deep packet inspection


Extended Independent Comparison of Popular Deep Packet Inspection (DPI) Tools for Traffic Classification
Add to Reading List

Document Date: 2014-01-20 09:10:01


Open Document

File Size: 1,52 MB

Share Result on Facebook

City

Barcelona / Jutland / /

Company

LinkedIn / ROS Broadband Communications Research Group / Amazon / eBay / BitTorrent / Skype / PPLive / Twitter / Google / YouTube / Bredbånd Nord A/S2 / Facebook / Cisco / Craigslist / Pere Barlet-Ros Broadband Communications Research Group / Justin.tv / Broadband Communications Research Group / VALENTIN CARELA-ESPAÑOL / Myspace / Talaia Networks / Yahoo / CNN / /

Country

Poland / Spain / Denmark / /

/

Facility

Campus Nord / University of Southern Denmark / Silesian University of Technology / Aalborg University / /

/

IndustryTerm

software engineering / obfuscated eDonkey protocol / network monitoring products / benchmark tool / web service / included web services / Internet applications / eDonkey protocol / resistant tool / included application protocols / spin-off / web services / /

OperatingSystem

Microsoft Windows / /

Organization

League of Legends / America’s Army / Universitat Politècnica de Catalunya / Computer Architecture Department / Aalborg University in Denmark / Silesian University / Spanish Ministry of Science and Innovation / Department of Computer Architecture / Department of Electronic Systems / European Regional Development Fund / /

Person

Valentín Carela-Español / TOMASZ BUJLOW / Jordi Girona / /

/

Position

co-founder / Supervisor / Associate Professor / /

Product

Dynamips / /

PublishedMedium

The Huffington Post / /

RadioStation

CBA / /

Region

Southern Denmark / /

SportsLeague

League of Legends / /

Technology

eDonkey protocol / protocol encryption / MAC address / Operating System / application protocol / SSL / encryption / Ethernet / obfuscated eDonkey protocol / 17 application protocols / HTTP / included application protocols / /

URL

http /

SocialTag