Journal articles on the topic 'P2P traffic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'P2P traffic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Iqbal, Masab, Luis Velasco, Marc Ruiz, et al. "Supporting Heterogenous Traffic on Top of Point-to-Multipoint Light-Trees." Sensors 23, no. 5 (2023): 2500. http://dx.doi.org/10.3390/s23052500.
Full textVelasco, Luis. "Supporting Heterogenous Traffic on Top of Point-to-Multipoint Light-Trees." Sensors 23, no. 5 (2024): 1–16. https://doi.org/10.3390/s23052500.
Full textLU, Gang, Hong-Li ZHANG, and Lin YE. "P2P Traffic Identification." Journal of Software 22, no. 6 (2011): 1281–98. http://dx.doi.org/10.3724/sp.j.1001.2011.03995.
Full textZhang, GuoQiang, MingDong Tang, SuQi Cheng, et al. "P2P traffic optimization." Science China Information Sciences 55, no. 7 (2011): 1475–92. http://dx.doi.org/10.1007/s11432-011-4464-8.
Full textGong, Shang Fu, and Juan Chen. "A P2P Traffic Detection Method Based on Support Vector Machine." Applied Mechanics and Materials 198-199 (September 2012): 1280–85. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1280.
Full textWu, Min, Ru Chuan Wang, Jing Li, and Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm." Key Engineering Materials 467-469 (February 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.
Full textWang, Chunzhi, Huili Zhang, and Zhiwei Ye. "A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 06 (2015): 1550048. http://dx.doi.org/10.1142/s0219691315500484.
Full textBhatia, Max, Vikrant Sharma, Parminder Singh, and Mehedi Masud. "Multi-Level P2P Traffic Classification Using Heuristic and Statistical-Based Techniques: A Hybrid Approach." Symmetry 12, no. 12 (2020): 2117. http://dx.doi.org/10.3390/sym12122117.
Full textYi, Yan, Zheng Yuan Su, Qing Jiang Zhao, and Zu Cheng Dai. "Research of P2P Traffic Real-Time Monitoring Technology Based on DPI." Applied Mechanics and Materials 340 (July 2013): 451–55. http://dx.doi.org/10.4028/www.scientific.net/amm.340.451.
Full textYan, Jinghua, Zhigang Wu, Hao Luo, and Shuzhuang Zhang. "P2P Traffic Identification Based on Host and Flow Behaviour Characteristics." Cybernetics and Information Technologies 13, no. 3 (2013): 64–76. http://dx.doi.org/10.2478/cait-2013-0026.
Full textYe, Wujian, and Kyungsan Cho. "P2P and P2P botnet traffic classification in two stages." Soft Computing 21, no. 5 (2015): 1315–26. http://dx.doi.org/10.1007/s00500-015-1863-6.
Full textMa, Zhi Qiang. "Research on P2P Traffic Monitoring System Based on DPI Technology." Applied Mechanics and Materials 686 (October 2014): 277–81. http://dx.doi.org/10.4028/www.scientific.net/amm.686.277.
Full textHuang, Zhi Min, and Qing Feng Wu. "The Design and Implementation of P2P Traffic Intelligent Guidance System." Applied Mechanics and Materials 475-476 (December 2013): 798–802. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.798.
Full textYang, Shuang, Ye Du, and Ru Hui Zhang. "Implementation of P2P Traffic Identification System." Applied Mechanics and Materials 44-47 (December 2010): 3318–21. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3318.
Full textJamil, Haitham Ahmed, Bushra M. Ali, Mosab Hamdan, and Ahmed E. Osman. "Online P2P Internet Traffic Classification and Mitigation Based on Snort and ML." European Journal of Engineering Research and Science 4, no. 10 (2019): 131–37. http://dx.doi.org/10.24018/ejers.2019.4.10.1534.
Full textJamil, Haitham Ahmed, Bushra M. Ali, Mosab Hamdan, and Ahmed E. Osman. "Online P2P Internet Traffic Classification and Mitigation Based on Snort and ML." European Journal of Engineering and Technology Research 4, no. 10 (2019): 131–37. http://dx.doi.org/10.24018/ejeng.2019.4.10.1534.
Full textRaahemi, Bijan, and Ali Mumtaz. "Classification of Peer-to-Peer Traffic Using A Two-Stage Window-Based Classifier With Fast Decision Tree and IP Layer Attributes." International Journal of Data Warehousing and Mining 6, no. 3 (2010): 28–42. http://dx.doi.org/10.4018/jdwm.2010070103.
Full textRaveesha, H. H. "DETECTION OF STEALTHY P2P BOT COMPROMISED HOSTS IN A NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 6 (2016): 843–46. https://doi.org/10.5281/zenodo.56028.
Full textBhatia, Max, and Mritunjay Kumar Rai. "Identifying P2P traffic: A survey." Peer-to-Peer Networking and Applications 10, no. 5 (2016): 1182–203. http://dx.doi.org/10.1007/s12083-016-0471-2.
Full textXing, Ying, Hui Shu, Fei Kang, and Hao Zhao. "Peertrap: An Unstructured P2P Botnet Detection Framework Based on SAW Community Discovery." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–18. http://dx.doi.org/10.1155/2022/9900396.
Full textKerpez, Ken, Yuanqiu Luo, and Frank J. Effenberger. "Bandwidth Reduction via Localized Peer-to-Peer (P2P) Video." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–10. http://dx.doi.org/10.1155/2010/562832.
Full textKucharzak, Michal, Adam Siwek, and Krzysztof Walkowiak. "Comparison of Evolutionary Algorithm and Heuristics for Flow Optimization in P2P Systems." International Journal of Electronics and Telecommunications 56, no. 2 (2010): 145–52. http://dx.doi.org/10.2478/v10177-010-0019-y.
Full textKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (2019): 2375. http://dx.doi.org/10.3390/app9112375.
Full textLi, Yanjun, Guoqing Zhang, and Guoqiang Zhang. "ISP-Friendly Data Scheduling by Advanced Locality-Aware Network Coding for P2P Distribution Cloud." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/968328.
Full textSousa, Pedro. "Towards Effective Control of P2P Traffic Aggregates in Network Infrastructures." Journal of Communications Software and Systems 11, no. 1 (2015): 37. http://dx.doi.org/10.24138/jcomss.v11i1.116.
Full textScanlon, Mark, Alan Hannaway, and Mohand-Tahar Kechadi. "Investigating Cybercrimes that Occur on Documented P2P Networks." International Journal of Ambient Computing and Intelligence 3, no. 2 (2011): 56–63. http://dx.doi.org/10.4018/jaci.2011040104.
Full textSun, Ru Xia, and Chun Yong Yin. "P2P Traffic Identification Algorithm Based on Topology." Advanced Materials Research 487 (March 2012): 297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.487.297.
Full textRichardson, Lucy M., Matthew D. Luker, Christopher M. Day, Mark Taylor, and Darcy M. Bullock. "Outcome Assessment of Peer-to-Peer Adaptive Control Adjacent to a National Park." Transportation Research Record: Journal of the Transportation Research Board 2620, no. 1 (2017): 43–53. http://dx.doi.org/10.3141/2620-05.
Full textCHENG, Wei-qing, Jian GONG, and Wei DING. "Identifying file-sharing P2P traffic based on traffic characteristics." Journal of China Universities of Posts and Telecommunications 15, no. 4 (2008): 112–20. http://dx.doi.org/10.1016/s1005-8885(08)60414-8.
Full textXiaan Bi, Dafang Zhang, Xiaobo Yang, and Sheng Chen. "An Efficient P2P Traffic Identification Scheme." International Journal of Digital Content Technology and its Applications 5, no. 12 (2011): 459–67. http://dx.doi.org/10.4156/jdcta.vol5.issue12.56.
Full textLiu, San-Min, and Zhi-Xin Sun. "Active learning for P2P traffic identification." Peer-to-Peer Networking and Applications 8, no. 5 (2014): 733–40. http://dx.doi.org/10.1007/s12083-014-0281-3.
Full textHu, Yan, Dah-Ming Chiu, and John C. S. Lui. "Profiling and identification of P2P traffic." Computer Networks 53, no. 6 (2009): 849–63. http://dx.doi.org/10.1016/j.comnet.2008.11.005.
Full textRahbarinia, Babak, Roberto Perdisci, Andrea Lanzi, and Kang Li. "PeerRush: Mining for unwanted P2P traffic." Journal of Information Security and Applications 19, no. 3 (2014): 194–208. http://dx.doi.org/10.1016/j.jisa.2014.03.002.
Full textGe, Jun Wei, Ming Zhao, and Yi Qiu Fang. "A Behavior-Based Rapid Method for P2P Traffic Identification." Applied Mechanics and Materials 380-384 (August 2013): 3661–66. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3661.
Full textBhushan, Shashi, M. Dave, and R. B. Patel. "Reducing Network Overhead with Common Junction Methodology." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 51–61. http://dx.doi.org/10.4018/jmcmc.2011070104.
Full textYang, Peng, and Lisong Xu. "On tradeoffs between cross-ISP P2P traffic and P2P streaming performance." Computer Networks 55, no. 18 (2011): 4033–42. http://dx.doi.org/10.1016/j.comnet.2011.07.013.
Full textLiu, Xi Zi, and Ya Bin Xu. "Design of Peer-to-Peer Traffic Classification System Model Based on Cloud Computing." Applied Mechanics and Materials 182-183 (June 2012): 1347–51. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1347.
Full textZhang, Qiu Xia, and Chao Song. "Flow Measurement and Control System in the Campus Network." Advanced Materials Research 950 (June 2014): 327–32. http://dx.doi.org/10.4028/www.scientific.net/amr.950.327.
Full textYan, Guang Hui, and Ming Hao Ai. "A Micro-Cluster-Based Data Stream Clustering Method for P2P Traffic Classification." Applied Mechanics and Materials 263-266 (December 2012): 1121–26. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1121.
Full textPeng, Jian Fen, Xu Yan Tu, Hong Bing Wang, and Ya Jian Zhou. "An early Intelligent P2P Traffic Identification Method." Applied Mechanics and Materials 321-324 (June 2013): 2812–17. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2812.
Full textChen, Jian Hong, Jian Qing Xi, and Liang Shao. "A Network Expense Model for Improving P2P Data Distribution Schemes." Advanced Materials Research 255-260 (May 2011): 2087–90. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2087.
Full textSu, Shang-Chiuan, Yi-Ren Chen, Shi-Chun Tsai, and Yi-Bing Lin. "Detecting P2P Botnet in Software Defined Networks." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/4723862.
Full textGharib, Mohammed, Marzieh Malekimajd, and Ali Movaghar. "SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems." Algorithms 11, no. 10 (2018): 150. http://dx.doi.org/10.3390/a11100150.
Full textZhao, Jia, Jianfeng Guan, Changqiao Xu, Wei Su, and Hongke Zhang. "Information Exchange rather than Topology Awareness: Cooperation between P2P Overlay and Traffic Engineering." Mathematical Problems in Engineering 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/792563.
Full textBi, Xia-an, Xiaohui Wang, Luyun Xu, Sheng Chen, and Hong Liu. "Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network." Discrete Dynamics in Nature and Society 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/801934.
Full textMa, Xiao Yu, and Fei Yan Chen. "A Design and Implementation of P2P Network Traffic Identification System." Advanced Materials Research 433-440 (January 2012): 5193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5193.
Full textHoang-Van, Hiep, Koki Mizutani, Takumi Miyoshi, and Olivier Fourmaux. "P2P Traffic Localization by Forcing Packet Loss." International Journal of Networked and Distributed Computing 1, no. 4 (2013): 251. http://dx.doi.org/10.2991/ijndc.2013.1.4.6.
Full textAnsari, Md Sarfaraj Alam, Kunwar Pal, Mahesh Chandra Govil, Prajjval Govil, and Adarsh Srivastava. "Ensemble Machine Learning for P2P Traffic Identification." International Journal of Computing and Digital Systems 10, no. 1 (2021): 1305–23. http://dx.doi.org/10.12785/ijcds/1001117.
Full textHuang, Zhen, Ernst Biersack, and Yuxing Peng. "Reducing Repair Traffic in P2P Backup Systems." ACM Transactions on Storage 7, no. 3 (2011): 1–41. http://dx.doi.org/10.1145/2027066.2027070.
Full textHong, Wei-ming. "A Novel Method for P2P Traffic Identification." Procedia Engineering 23 (2011): 204–9. http://dx.doi.org/10.1016/j.proeng.2011.11.2490.
Full text