Login / Signup

Identify P2P traffic by inspecting data transfer behavior.

Ke XuMing ZhangMingjiang YeDah-Ming ChiuJianping Wu
Published in: Comput. Commun. (2010)
Keyphrases
  • data transfer
  • data access
  • data flow
  • data transmission
  • file system
  • web access
  • data delivery
  • parallel computers
  • data analysis
  • information systems
  • data mining techniques