[1]
S. Sen and J. Wang, Analyzing Peer-to-Peer Traffic Across Large Networks, ACM / IEEE Transactions on Networking, Vol. 12, No. 2, pp.137-150, (2004).
DOI: 10.1109/tnet.2004.826277
Google Scholar
[2]
Nadia Ben Azzouna and Fabrice Guillemin. Impact of peer-to-peer applications on wide area network traffic: an experimental approach. Global Telecommunications Conference. Vol. 3, pp.1544-1548, (2004).
DOI: 10.1109/glocom.2004.1378241
Google Scholar
[3]
Bartlett G, Heidemann J, Papadopoulos C. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. In Proceedings of 10th IEEEGlobal Internet Symposium in conjunction with IEEE INFOCOM 2007, pp.55-60.
DOI: 10.1109/gi.2007.4301431
Google Scholar
[4]
Yanxiang He, Qiang Cao, Yi Han, Libing Wu, Tao Liu. Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing, pp.1-9.
DOI: 10.1109/ipdps.2009.5161178
Google Scholar
[5]
Fras M, Klampfer S, Cucej Z. Impact of P2P traffic on IP communication networks' performances. IWSSIP 2008 15th International Conference on, pp.205-208.
DOI: 10.1109/iwssip.2008.4604403
Google Scholar
[6]
Karagiannis T, Broido A, Brownlee N, et al. File-sharing in the internet: a characterization of P2P traffic in the backbone. Technical Report. Riverside, CA, USA: University of California, (2003).
Google Scholar
[7]
Kolarov A, Atai A, Hui, J., Application of Kalman filter in high-speed networks, GLOBECOM '94. 1994 vol. 1. p.624 ~ 628.
DOI: 10.1109/glocom.1994.513593
Google Scholar
[8]
Yi Qiao, Jason Skicewicz, Peter Dinda. An Empirical Study of Multiscale Predictability of Network Traffic. IEEE International Symposium on High Performance Distributed Computing, Proceedings, Proceedings-13th IEEE International Symposium on High Performance Distributed Computing, 2004, pp.66-76.
DOI: 10.1109/hpdc.2004.1323493
Google Scholar