Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Network Operations (C.2.3) > Network Monitoring (C.2.3...)  
 
Options:
 
  1-10 of 111 Reviews about "Network Monitoring (C.2.3...)": Date Reviewed
   Zooming in on wide-area latencies to a global cloud provider
Jin Y., Renganathan S., Ananthanarayanan G., Jiang J., Padmanabhan V., Schroder M., Calder M., Krishnamurthy A.  SIGCOMM 2019 (Proceedings of the ACM Special Interest Group on Data Communication, Beijing, China,  Aug 19-23, 2019) 104-116, 2019. Type: Proceedings

The authors measure wide area network (WAN) latency from the viewpoint of a large cloud provider, Azure, by tracking the round-trip time (RTT) of transmission control protocol (TCP) connections. Presenting their tool BlameIt, the authors aim to fi...

Feb 27 2020
  Known and unknown facts of LoRa: experiences from a large-scale measurement study
Liando J., Gamage A., Tengourtius A., Li M.  ACM Transactions on Sensor Networks 15(2): 1-35, 2019. Type: Article

Proposal and critique are two steps in the evolution of scientific theories and ideas: an idea is founded in a proposal and advanced via critiques. In the Internet of Things (IOT), equilibrium among power consumption, coverage, and coexistence is ...

Feb 18 2020
  Practical packet analysis: using Wireshark to solve real-world network problems (3rd ed.)
Sanders C.,  No Starch Press, San Francisco, CA, 2017. 368 pp. Type: Book (978-1-593278-02-1)

The study of the operation of network protocols, as well as the improvement of a network’s functionality and security, are the main aspects that network packet analysis considers. Known as both a software protocol analysis and a packet sniff...

Dec 5 2017
  Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties
Sultana N., Kohlweiss M., Moore A.  HotMiddlebox 2016 (Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, Florianopolis, Brazil,  Aug 22-26, 2016) 1-6, 2016. Type: Proceedings

Sultana et al. tackle the problem of remotely making measurements on a network over which the party conducting the reconnaissance has no control. Such scenarios are prevalent in cloud computing, where the subscriber to a cloud service has no visib...

Mar 30 2017
  Dynamic networks and cyber-security
Heard N., Heard N., Adams N.,  WORLD SCIENTIFIC, Hackensack, NJ, 2016. 200 pp. Type: Book (978-1-786340-74-0)

Much of the existing work on network cyber security is based on analyzing previously observed attacks in order to determine attack signatures. This is certainly the predominant approach taken to intrusion detection. In contrast, the work in this b...

Aug 17 2016
  Imputation of missing links and attributes in longitudinal social surveys
Ouzienko V., Obradovic Z.  Machine Learning 95(3): 329-356, 2014. Type: Article

Social network surveys, in which people are asked to identify their friends, are important tools for social scientists for studying social settings and phenomena such as villages, urban settings, street gangs, and crime. Such surveys are often con...

Apr 17 2015
  The practice of network security monitoring: understanding incident detection and response
Bejtlich R.,  No Starch Press, San Francisco, CA, 2013. 376 pp. Type: Book (978-1-593275-09-9)

I reached for this book because I am one of those readers who needs what it offers. That is, I wanted to learn about network monitoring to improve its security. As the author advises on several occasions, the book is aimed at those professionals w...

Feb 10 2014
  Nagios: building enterprise-grade monitoring infrastructures for systems and networks (2nd ed.)
Josephsen D.,  Prentice Hall Press, Upper Saddle River, NJ, 2013. 304 pp. Type: Book (978-0-133135-73-2)

We are all aware of the importance of computers in our lives, and the problems that can ensue when they fail. Computer monitoring systems do just as their name suggests: they monitor computers and networks for problems, and notify administrators w...

Dec 27 2013
  PHYS: profiled-hybrid sampling for soft error reliability benchmarking
Suh J., Annavaram M., Dubois M.  DSN 2013 (Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 24-27, 2013) 1-12, 2013. Type: Proceedings

The evaluation of error protection techniques is critical for cost/benefit considerations. The effect of error protection mechanisms on the soft error reliability of the system must be measured to determine the appropriate protection level. Reliab...

Oct 23 2013
  Characterizing per-application network traffic using entropy
Petkov V., Rajagopal R., Obraczka K.  ACM Transactions on Modeling and Computer Simulation 23(2): 1-25, 2013. Type: Article

Several emerging algorithms for data mining, modeling, and simulation offer support for the visualization of business data and information. Business applications with intensive computational needs require the efficient use of bandwidth to effectiv...

Jul 22 2013
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy