[1]
M. Bottero, B. Dalla Chiara, F.P. Deflorio: Wireless sensor networks for traffic monitoring in a logistic centre, Transportation Research Part C: Emerging Technologies, Vol. 26 (2013), P. 99-124.
DOI: 10.1016/j.trc.2012.06.008
Google Scholar
[2]
N. Messai, P. Thomas, D. Lefebvre: Neural networks for local monitoring of traffic magnetic sensors, Control Engineering Practice, Vol. 13 (2005), P. 67-80.
DOI: 10.1016/j.conengprac.2004.02.005
Google Scholar
[3]
M. Iliofotou, H. Kim, M. Faloutsos, M. Mitzenmacher: Graption: A graph-based P2P traffic classification framework for the internet backbone, Computer Networks, Vol. 55 (2011), P. 1909-(1920).
DOI: 10.1016/j.comnet.2011.01.020
Google Scholar
[4]
G. Giorgi, C. Narduzzi: Rate-interval curves - A tool for the analysis and monitoring of network traffic, Performance Evaluation, Vol. 65 (2008), P. 441-462.
DOI: 10.1016/j.peva.2007.12.003
Google Scholar
[5]
T. Field, U. Harder, P. Harrison: Network traffic behaviour in switched Ethernet systems, Performance Evaluation, Vol. 58 (2004), P. 243-260.
DOI: 10.1016/j.peva.2004.07.017
Google Scholar
[6]
F. Ricciato, F. Vacirca, P. Svoboda: Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis, Computer Networks, Vol. 51 (2007), P. 1205-1231.
DOI: 10.1016/j.comnet.2006.07.011
Google Scholar
[7]
P. B. Ros, G. Iannaccone, J. S. Cuxart, J. S. Pareta: Robust network monitoring in the presence of non-cooperative traffic queries, Computer Networks, Vol. 53 (2009), P. 310-321.
DOI: 10.1016/j.comnet.2008.10.007
Google Scholar
[8]
F. Mata, J. L. G. Dorado, J. Aracil: Detection of traffic changes in large-scale backbone networks: The case of the Spanish academic network, Computer Networks, Vol. 56 (2012), P. 686-702.
DOI: 10.1016/j.comnet.2011.10.017
Google Scholar
[9]
B. Li, J. Springer, G. Bebis, M. H. Gunes: A survey of network flow applications, Journal of Network and Computer Applications, Vol. 36 (2013), P. 567-581.
DOI: 10.1016/j.jnca.2012.12.020
Google Scholar
[10]
A. N. Mahmood, J. Hu, Z. Tari, C. Leckie: Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic, Journal of Network and Computer Applications, Vol. 33 (2010), P. 491-502.
DOI: 10.1016/j.jnca.2010.01.003
Google Scholar