Search results

    Filter results

  • Full text

  • Document type

  • Publication year

  • Organisation

Results: 11
Number of items: 11
  • Mata, F., Żuraniewski, P., Mandjes, M., & Mellia, M. (2014). Anomaly detection in diurnal data. Computer Networks, 60, 187-200. https://doi.org/10.1016/j.bjp.2013.11.011
  • Żuraniewski, P., Mandjes, M., van den Berg, H., & Malhotra, R. (2013). Resource Allocation in a Multiple-Priority Buffered Link. In A. Dudin, & K. De Turck (Eds.), Analytical and Stochastic Modeling Techniques and Applications: 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013 : proceedings (pp. 457-471). (Lecture Notes in Computer Science; Vol. 7984). Springer. https://doi.org/10.1007/978-3-642-39408-9_32
  • Ellens, W., Żuraniewski, P., Sperotto, A., Schotanus, H., Mandjes, M., & Meeuwissen, E. (2013). Flow-Based Detection of DNS Tunnels. In G. Doyen, M. Waldburger, P. Čeleda, A. Sperotto, & B. Stiller (Eds.), Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 international conference on autonomous infrastructure management, and security, AIMS 2013, Barcelona, Spain, June 25-28, 2013, proceedings (pp. 124-135). (Lecture Notes in Computer Science; Vol. 7943). Springer. https://doi.org/10.1007/978-3-642-38998-6_16
  • Mandjes, M., & Żuraniewski, P. (2013). Changepoint Detection Techniques for VoIP Traffic. In E. Biersack, C. Callegari, & M. Matijasevic (Eds.), Data traffic monitoring and analysis (pp. 184-201). (Lecture Notes in Computer Science; No. 7754). Springer. https://doi.org/10.1007/978-3-642-36784-7_8
  • Callegari, C., Coluccia, A., D'Alconzo, A., Ellens, W., Giordano, S., Mandjes, M., Pagano, P., Pepe, T., Ricciato, F., & Żuraniewski, P. (2013). A Methodological Overview on Anomaly Detection. In E. Biersack, C. Callegari, & M. Matijasevic (Eds.), Data traffic monitoring and analysis: from measurement, classification, and anomaly detection to quality of experience (pp. 148-183). (Lecture Notes in Computer Science; No. 7754). Springer. https://doi.org/10.1007/978-3-642-36784-7_7
  • Mata, F., Zuraniewski, P., Mandjes, M., & Mellia, M. (2012). Anomaly detection in VoIP traffic with trends. In A. Jajszczyk, & Z. Papir (Eds.), 2012 24th International Teletraffic Congress (ITC 24): 4-7 September, Kraków, Poland: final program (pp. 9-16). IEEE. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6324498
  • Mandjes, M., & Żuraniewski, P. (2011). M/G/∞ transience, and its applications to overload detection. Performance Evaluation, 68(6), 507-527. https://doi.org/10.1016/j.peva.2011.01.008
  • Open Access
    Mandjes, M., & Żuraniewski, P. (2011). Tail asymptotics of the M/G/∞ model. Stochastic Models, 27(1), 77-93. https://doi.org/10.1080/15326349.2011.542730
  • Open Access
    Zuraniewski, P. W. (2011). Stochastic modelling and control of communication networks. [Thesis, fully internal, Universiteit van Amsterdam]. Uitgeverij BOXPress.
  • Żuraniewski, P., Mandjes, M., & Mellia, M. (2010). Empirical assessment of VoIP overload detection tests. In 6th EURO-NF Conference on Next Generation Internet (NGI 2010), Paris, France IEEE. https://doi.org/10.1109/NGI.2010.5534457
Page 1 of 2