• Cardoso Á, Ferreira M and Vieira F. (2021). Delay bound estimation for multicarrier 5G systems considering lognormal beta traffic envelope and stochastic service curve. Transactions on Emerging Telecommunications Technologies. 32:10. Online publication date: 7-Oct-2021.

    https://doi.org/10.1002/ett.4281

  • Craigmile P and Mondal D. (2019). Estimation of long-range dependence in gappy Gaussian time series. Statistics and Computing. 30:1. (167-185). Online publication date: 1-Feb-2020.

    https://doi.org/10.1007/s11222-019-09874-0

  • Willinger W, Taqqu M and Wilson D. (2019). Lessons from "on the self-similar nature of ethernet traffic". ACM SIGCOMM Computer Communication Review. 49:5. (56-62). Online publication date: 8-Nov-2019.

    https://doi.org/10.1145/3371934.3371955

  • Krasnov A and Nikol’skii D. Statistical Distributions of Partial Correlators of Network Traffic Aggregated Packets for Distinguishing DDoS Attacks. Distributed Computer and Communication Networks. (365-378).

    https://doi.org/10.1007/978-3-030-36614-8_28

  • Zhang M, Li J and Brooks S. (2017). I-Seismograph. IEEE/ACM Transactions on Networking. 25:6. (3411-3426). Online publication date: 1-Dec-2017.

    https://doi.org/10.1109/TNET.2017.2748902

  • Barba-Jimenez C, Ramirez-Velarde R and Nolazco-Flores J. (2017). Models for wireless H.264 video-on-demand services using self-similarity and heavy-tails. Wireless Networks. 23:7. (2239-2252). Online publication date: 1-Oct-2017.

    https://doi.org/10.1007/s11276-016-1281-4

  • Fontugne R, Abry P, Fukuda K, Veitch D, Cho K, Borgnat P and Wendt H. (2017). Scaling in Internet Traffic. IEEE/ACM Transactions on Networking. 25:4. (2152-2165). Online publication date: 1-Aug-2017.

    https://doi.org/10.1109/TNET.2017.2675450

  • Shi H, Li H, Zhang D, Cheng C and Wu W. (2017). Efficient and robust feature extraction and selection for traffic classification. Computer Networks: The International Journal of Computer and Telecommunications Networking. 119:C. (1-16). Online publication date: 4-Jun-2017.

    https://doi.org/10.1016/j.comnet.2017.03.011

  • Combrexelle S, Wendt H, Didier G and Abry P. Multivariate scale-free dynamics: Testing fractal connectivity. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). (3984-3988).

    https://doi.org/10.1109/ICASSP.2017.7952904

  • Ashok A, Poornachandran P, Pal S, Sankar P, Surendran K, Thampi S and El-Alfy E. (2017). Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology. 32:4. (2901-2907). Online publication date: 1-Jan-2017.

    https://doi.org/10.3233/JIFS-169233

  • (2017). ATMSim. International Journal of Web and Grid Services. 13:3. (334-350). Online publication date: 1-Jan-2017.

    https://doi.org/10.1504/IJWGS.2017.085148

  • Chowdhury T, Elkin C, Devabhaktuni V, Rawat D and Oluoch J. (2016). Advances on localization techniques for wireless sensor networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 110:C. (284-305). Online publication date: 9-Dec-2016.

    https://doi.org/10.1016/j.comnet.2016.10.006

  • Liu Q, Zhao X, Willinger W, Wang X, Zhao B and Zheng H. (2016). Self-Similarity in Social Network Dynamics. ACM Transactions on Modeling and Performance Evaluation of Computing Systems. 2:1. (1-26). Online publication date: 18-Nov-2016.

    https://doi.org/10.1145/2994142

  • Nelson J, Nafornita C and Isar A. (2016). Semi-Local Scaling Exponent Estimation With Box-Penalty Constraints and Total-Variation Regularization. IEEE Transactions on Image Processing. 25:7. (3167-3181). Online publication date: 1-Jul-2016.

    https://doi.org/10.1109/TIP.2016.2551365

  • Barba-Jimenez C, Ramirez-Velarde R, Tchernykh A, Rodríguez-Dagnino R, Nolazco-Flores J and Perez-Cazares R. (2016). Cloud based Video-on-Demand service model ensuring quality of service and scalability. Journal of Network and Computer Applications. 70:C. (102-113). Online publication date: 1-Jul-2016.

    https://doi.org/10.1016/j.jnca.2016.05.007

  • Palo H, Mohanty M and Chandra M. (2016). Efficient feature combination techniques for emotional speech classification. International Journal of Speech Technology. 19:1. (135-150). Online publication date: 1-Mar-2016.

    https://doi.org/10.1007/s10772-016-9333-9

  • Dabrowski C. (2015). Catastrophic event phenomena in communication networks. Computer Science Review. 18:C. (10-45). Online publication date: 1-Nov-2015.

    https://doi.org/10.1016/j.cosrev.2015.10.001

  • Li T and Liu J. (2014). Cluster-Based Spatiotemporal Background Traffic Generation for Network Simulation. ACM Transactions on Modeling and Computer Simulation. 25:1. (1-25). Online publication date: 14-Jan-2015.

    https://doi.org/10.1145/2667222

  • Xi X and Mamon R. (2014). Capturing the Regime-Switching and Memory Properties of Interest Rates. Computational Economics. 44:3. (307-337). Online publication date: 1-Oct-2014.

    https://doi.org/10.1007/s10614-013-9396-5

  • Wen J, Ma Y, Liu P and Sun S. (2014). Distributed multipliers in MWM for analyzing job arrival processes in massive HPC workload datasets. Future Generation Computer Systems. 37:C. (335-344). Online publication date: 1-Jul-2014.

    https://doi.org/10.1016/j.future.2013.12.009

  • Gospodinova E and Gospodinov M. Fractal and multifractal analysis of network teletraffic. Proceedings of the 13th International Conference on Computer Systems and Technologies. (224-231).

    https://doi.org/10.1145/2383276.2383310

  • Lee C, Lee D and Moon S. Unmasking the growing UDP traffic in a campus network. Proceedings of the 13th international conference on Passive and Active Measurement. (1-10).

    https://doi.org/10.1007/978-3-642-28537-0_1

  • Pujol-Gil E and Chatzis N. A traffic regulation method based on MRA signatures to reduce unwanted traffic from compromised end-user machines. Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security. (264-279).

    https://doi.org/10.1007/978-3-642-28879-1_18

  • Bak A, Gajowniczek P and Pilarski M. Gaussian approximation of CDN call level traffic. Proceedings of the 23rd International Teletraffic Congress. (135-141).

    /doi/10.5555/2043468.2043490

  • Sousa-Vieira M. Suitability of the M/G/∞ process for modeling scalable H.264 video traffic. Proceedings of the 18th international conference on Analytical and stochastic modeling techniques and applications. (149-158).

    /doi/10.5555/2022315.2022330

  • Mouchos H, Tsokanos A and Kouvatsos D. Performance modelling and traffic characterisation of optical networks. Network performance engineering. (859-890).

    /doi/10.5555/1996629.1996674

  • Markovich N and Krieger U. Statistical analysis and modeling of peer-to-peer multimedia traffic. Network performance engineering. (70-97).

    /doi/10.5555/1996629.1996635

  • Zhani M, Elbiaze H and Kamoun F. (2010). Analysis of prediction performance of training-based models using real network traffic. International Journal of Computer Applications in Technology. 37:1. (10-19). Online publication date: 1-Dec-2010.

    https://doi.org/10.1504/IJCAT.2010.030471

  • Sepúlveda J, Strum M, Chau W and Pires R. The LRD traffic impact on the NoC-based SoCs. Proceedings of the 23rd symposium on Integrated circuits and system design. (97-102).

    https://doi.org/10.1145/1854153.1854179

  • Li M, Zhao W and Chen S. (2010). FGN based telecommunication traffic models. WSEAS Transactions on Computers. 9:7. (706-715). Online publication date: 1-Jul-2010.

    /doi/10.5555/1852450.1852454

  • Sousa-Vieira M. Robustness of the whittle estimator applied to non-Gaussian long-range dependent processes. Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications. (277-290).

    /doi/10.5555/1883941.1883967

  • Sousa-Vieira M, Suárez-González A, López-García C, Fernández-Veiga M, López-Ardao J and Rodríguez-Rubio R. (2010). Fast simulation of self-similar and correlated processes. Mathematics and Computers in Simulation. 80:10. (2040-2061). Online publication date: 1-Jun-2010.

    https://doi.org/10.1016/j.matcom.2010.01.010

  • Li M. Essay on teletraffic models (I). Proceedings of the 9th WSEAS international conference on Applied computer and applied computational science. (130-135).

    /doi/10.5555/1844074.1844097

  • Long X and Sikdar B. (2010). A mechanism for detecting session hijacks in wireless networks. IEEE Transactions on Wireless Communications. 9:4. (1380-1389). Online publication date: 1-Apr-2010.

    https://doi.org/10.1109/TWC.2010.04.081447

  • Bregni S, Giacomazzi P and Saddemi G. (2010). Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers. Computer Communications. 33:6. (714-720). Online publication date: 1-Apr-2010.

    https://doi.org/10.1016/j.comcom.2009.11.018

  • Li M, Chen W and Han L. (2010). Correlation matching method for the weak stationarity test of LRD traffic. Telecommunications Systems. 43:3-4. (181-195). Online publication date: 1-Apr-2010.

    https://doi.org/10.1007/s11235-009-9206-5

  • Abry P, Borgnat P, Ricciato F, Scherrer A and Veitch D. (2010). Revisiting an old friend. Telecommunications Systems. 43:3-4. (147-165). Online publication date: 1-Apr-2010.

    https://doi.org/10.1007/s11235-009-9205-6

  • Elbiaze H, Zhani M, Cherkaoui O and Kamoun F. (2010). A new structure-preserving method of sampling for predicting self-similar traffic. Telecommunications Systems. 43:3-4. (265-277). Online publication date: 1-Apr-2010.

    https://doi.org/10.1007/s11235-009-9201-x

  • Sousa-Vieira M, Suárez-González A, Rodríguez-Rubio R and López-García C. (2010). Flexible adjustment of the short-term correlation of LRD M/G/∞-based processes. Electronic Notes in Theoretical Computer Science (ENTCS). 261. (131-145). Online publication date: 1-Feb-2010.

    https://doi.org/10.1016/j.entcs.2010.01.009

  • Beran J. (2010). Long‐range dependence. WIREs Computational Statistics. 2:1. (26-35). Online publication date: 19-Jan-2010.

    https://doi.org/10.1002/wics.52

  • Pérez C, Dominguez L and Pacheco J. (2010). On the minimum number of users for the generation of H-ss traffic in a simulation scenario. WSEAS TRANSACTIONS on COMMUNICATIONS. 9:1. (1-10). Online publication date: 1-Jan-2010.

    /doi/10.5555/1852321.1852322

  • Xia Z, Lu S, Li J and Zhang A. A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. Information and Communications Security. (283-292).

    https://doi.org/10.1007/978-3-642-11145-7_22

  • Ricciato F, Coluccia A, D'Alconzo A, Veitch D, Borgnat P and Abry P. On the role of flows and sessions in internet traffic modeling. Proceedings of the 28th IEEE conference on Global telecommunications. (2880-2887).

    /doi/10.5555/1811681.1811858

  • Xia Z, Lu S, Li J and Ma J. Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity. Proceedings of the International Conference on Web Information Systems and Mining. (383-392).

    https://doi.org/10.1007/978-3-642-05250-7_41

  • Bai X, Liu D and Qiu T. Research and application of an online real time hurst parameter measure algorithm. Proceedings of the 3rd international conference on Intelligent information technology application. (15-17).

    /doi/10.5555/1794554.1794558

  • Perez C, Dominguez L and Pacheco J. A simulation scenario for performance studies under self-similar traffic. Proceedings of the 8th WSEAS international conference on Data networks, communications, computers. (185-189).

    /doi/10.5555/1670344.1670373

  • Beran J, Ghosh S and Schell D. (2009). On least squares estimation for long-memory lattice processes. Journal of Multivariate Analysis. 100:10. (2178-2194). Online publication date: 1-Nov-2009.

    https://doi.org/10.1016/j.jmva.2009.04.007

  • Khadivi Heris H, Seyed Aghazadeh B and Nikkhah-Bahrami M. (2009). Optimal feature selection for the assessment of vocal fold disorders. Computers in Biology and Medicine. 39:10. (860-868). Online publication date: 1-Oct-2009.

    https://doi.org/10.1016/j.compbiomed.2009.06.014

  • Szabó G, Veres A and Molnár S. (2009). On the impacts of human interactions in MMORPG traffic. Multimedia Tools and Applications. 45:1-3. (133-161). Online publication date: 1-Oct-2009.

    https://doi.org/10.1007/s11042-009-0298-4

  • Zhani M, Elbiaze H and Kamoun F. An empirical evaluation of short-period prediction performance. Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems. (347-354).

    /doi/10.5555/1688291.1688342

  • Gospodinova E and Gospodinov M. The influence of self-similar traffic on telecommunication network queuing. Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing. (1-5).

    https://doi.org/10.1145/1731740.1731800

  • Loiseau P, Gonçalves P, Girard S, Forbes F and Vicat-Blanc Primet P. (2009). Maximum likelihood estimation of the flow size distribution tail index from sampled packet data. ACM SIGMETRICS Performance Evaluation Review. 37:1. (263-274). Online publication date: 15-Jun-2009.

    https://doi.org/10.1145/2492101.1555380

  • Anand A, Muthukrishnan C, Akella A and Ramjee R. (2009). Redundancy in network traffic. ACM SIGMETRICS Performance Evaluation Review. 37:1. (37-48). Online publication date: 15-Jun-2009.

    https://doi.org/10.1145/2492101.1555355

  • Loiseau P, Gonçalves P, Girard S, Forbes F and Vicat-Blanc Primet P. Maximum likelihood estimation of the flow size distribution tail index from sampled packet data. Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems. (263-274).

    https://doi.org/10.1145/1555349.1555380

  • Anand A, Muthukrishnan C, Akella A and Ramjee R. Redundancy in network traffic. Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems. (37-48).

    https://doi.org/10.1145/1555349.1555355

  • Vishwanath K and Vahdat A. (2009). Swing. IEEE/ACM Transactions on Networking. 17:3. (712-725). Online publication date: 1-Jun-2009.

    https://doi.org/10.1109/TNET.2009.2020830

  • Paschalidis I and Smaragdakis G. (2009). Spatio-temporal network anomaly detection by assessing deviations of empirical measures. IEEE/ACM Transactions on Networking. 17:3. (685-697). Online publication date: 1-Jun-2009.

    https://doi.org/10.1109/TNET.2008.2001468

  • Li M. Self-similarity and long-range dependence in teletraffic. Proceedings of the 9th WSEAS international conference on Multimedia systems & signal processing. (19-24).

    /doi/10.5555/1576659.1576661

  • Markovich N, Undheim A and Emstad P. (2009). Classification of slice-based VBR video traffic and estimation of link loss by exceedance. Computer Networks: The International Journal of Computer and Telecommunications Networking. 53:7. (1137-1153). Online publication date: 1-May-2009.

    https://doi.org/10.1016/j.comnet.2008.12.020

  • Li H. (2009). Workload dynamics on clusters and grids. The Journal of Supercomputing. 47:1. (1-20). Online publication date: 1-Jan-2009.

    https://doi.org/10.1007/s11227-008-0189-x

  • Fontugne R, Hirotsu T and Fukuda K. An image processing approach to traffic anomaly detection. Proceedings of the 4th Asian Conference on Internet Engineering. (17-26).

    https://doi.org/10.1145/1503370.1503377

  • Vishwanath K and Vahdat A. Evaluating distributed systems. USENIX 2008 Annual Technical Conference. (227-240).

    /doi/10.5555/1404014.1404031

  • Li M, Zhang Y and Zhao W. A practical method for weak stationarity test of network traffic with long-range dependence. Proceedings of the 8th WSEAS International Conference on Multimedia systems and signal processing. (40-45).

    /doi/10.5555/1416408.1416418

  • Surgailis D, Teyssière G and Vaičiulis M. (2008). The increment ratio statistic. Journal of Multivariate Analysis. 99:3. (510-541). Online publication date: 1-Mar-2008.

    https://doi.org/10.1016/j.jmva.2007.01.014

  • Sastry C, Rawat S, Pujari A and Gulati V. (2007). Network traffic analysis using singular value decomposition and multiscale transforms. Information Sciences: an International Journal. 177:23. (5275-5291). Online publication date: 1-Dec-2007.

    https://doi.org/10.1016/j.ins.2006.07.007

  • Pezaros D, Sifalakis M and Hutchison D. Measurement and analysis of intraflow performance characteristics of wireless traffic. Proceedings of the 7th IEEE international conference on IP operations and management. (143-155).

    /doi/10.5555/1775321.1775339

  • Loiseau P, Gonçalves P and Vicat-Blanc P. A comparative study of different heavy tail index estimators of the flow size from sampled data. Proceedings of the first international conference on Networks for grid applications. (1-8).

    /doi/10.5555/1386610.1386643

  • Watkins L, Beyah R and Corbett C. Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments. Proceedings of the first international conference on Networks for grid applications. (1-8).

    /doi/10.5555/1386610.1386632

  • Park C, Godtliebsen F, Taqqu M, Stoev S and Marron J. (2007). Visualization and inference based on wavelet coefficients, SiZer and SiNos. Computational Statistics & Data Analysis. 51:12. (5994-6012). Online publication date: 1-Aug-2007.

    https://doi.org/10.1016/j.csda.2006.11.037

  • Haßlinger G, Mende J, Geib R, Beckhaus T and Hartleb F. Measurement and characteristics of aggregated traffic in broadband access networks. Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks. (998-1010).

    /doi/10.5555/1769187.1769293

  • Lee I and Fapojuwo A. Understanding IP traffic via cluster processes. Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks. (248-259).

    /doi/10.5555/1769187.1769219

  • Zhang S and Vernon M. Offline and online network traffic characterization. Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet. (912-923).

    /doi/10.5555/1772322.1772420

  • Yu Cheng , Ravindran V and Leon-Garcia A. Internet Traffic Characterization Using Packet-Pair Probing. Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. (1766-1774).

    https://doi.org/10.1109/INFCOM.2007.206

  • Nalatwad S and Devetsikiotis M. (2007). Wavelet-based Neighborhood Control for Self-Sizing Networks. Simulation. 83:3. (229-244). Online publication date: 1-Mar-2007.

    https://doi.org/10.1177/0037549707081187

  • Zaragoza D and Belo C. (2007). Experimental validation of the ON-OFF packet-level model for IP traffic. Computer Communications. 30:5. (975-989). Online publication date: 1-Mar-2007.

    https://doi.org/10.1016/j.comcom.2006.08.029

  • Malone D, Duffy K and King C. (2007). Some remarks on ld plots for heavy-tailed traffic. ACM SIGCOMM Computer Communication Review. 37:1. (41-42). Online publication date: 22-Jan-2007.

    https://doi.org/10.1145/1198255.1198261

  • Scherrer A, Larrieu N, Owezarski P, Borgnat P and Abry P. (2007). Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. IEEE Transactions on Dependable and Secure Computing. 4:1. (56-70). Online publication date: 1-Jan-2007.

    https://doi.org/10.1109/TDSC.2007.12

  • Chen K, Huang P and Lei C. (2006). Game traffic analysis. Computer Networks: The International Journal of Computer and Telecommunications Networking. 50:16. (3002-3023). Online publication date: 14-Nov-2006.

    https://doi.org/10.1016/j.comnet.2005.11.005

  • Erol M, Akgul T, Oktug S and Baykut S. On the use of principle component analysis for the hurst parameter estimation of long-range dependent network traffic. Proceedings of the 21st international conference on Computer and Information Sciences. (464-473).

    https://doi.org/10.1007/11902140_50

  • Cevizci I, Erol M and Oktug S. Analysis of multi-player online game traffic based on self-similarity. Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games. (25-es).

    https://doi.org/10.1145/1230040.1230093

  • Vishwanath K and Vahdat A. Realistic and responsive network traffic generation. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. (111-122).

    https://doi.org/10.1145/1159913.1159928

  • Vishwanath K and Vahdat A. (2006). Realistic and responsive network traffic generation. ACM SIGCOMM Computer Communication Review. 36:4. (111-122). Online publication date: 11-Aug-2006.

    https://doi.org/10.1145/1151659.1159928

  • Ricciato F. (2006). Some remarks to recent papers on traffic analysis. ACM SIGCOMM Computer Communication Review. 36:3. (99-102). Online publication date: 5-Jul-2006.

    https://doi.org/10.1145/1140086.1140099

  • Rezaul K, Pakstas A, Gilchrist R and Chen T. HEAF. Proceedings of the 6th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking. (34-45).

    https://doi.org/10.1007/11759355_6

  • Janowski L, Ziegler T and Hasenleithner E. A scaling analysis of UMTS traffic. Proceedings of the 6th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking. (211-222).

    https://doi.org/10.1007/11759355_21

  • Yu K, Lee W, Ahn S and Chung J. Automatic location detection system for anomaly traffic on wired/wireless networks. Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II. (982-988).

    https://doi.org/10.1007/11751588_102

  • Gonzaga A and Kawanaka A. (2006). Asymptotic decorrelation of between-scale wavelet coefficients of generalized fractional process. Digital Signal Processing. 16:3. (320-329). Online publication date: 1-May-2006.

    https://doi.org/10.1016/j.dsp.2005.11.003

  • Backhouse A and Gu I. (2006). Bayesian traffic dynamics and packet loss prediction for video over IP networks. Multimedia Systems. 11:5. (468-479). Online publication date: 1-May-2006.

    https://doi.org/10.1007/s00530-006-0016-2

  • Nalatwad S and Devetsikiotis M. A Framework for Adaptive Wavelet Prediction in Self-Sizing Networks. Proceedings of the 39th annual Symposium on Simulation. (10-17).

    https://doi.org/10.1109/ANSS.2006.4

  • Lee I and Fapojuwo A. (2005). Stochastic processes for computer network traffic modeling. Computer Communications. 29:1. (1-23). Online publication date: 1-Dec-2005.

    https://doi.org/10.1016/j.comcom.2005.02.004

  • Dattatreya G. Hurst parameter estimation from noisy observations of data traffic traces. Proceedings of the 4th WSEAS international conference on Electronics, control and signal processing. (193-198).

    /doi/10.5555/1974895.1974935

  • Muscariello L, Mellia M, Meo M, Ajmone Marsan M and Lo Cigno R. (2005). Markov models of internet traffic and a new hierarchical MMPP model. Computer Communications. 28:16. (1835-1851). Online publication date: 1-Oct-2005.

    https://doi.org/10.1016/j.comcom.2005.02.012

  • Won Y and Ahn S. (2005). GOP ARIMA. Multimedia Systems. 10:5. (359-378). Online publication date: 1-Aug-2005.

    https://doi.org/10.1007/s00530-005-0166-7

  • Xia C, Liu Z, Squillante M, Zhang L and Malouch N. (2005). Web traffic modeling at finer time scales and performance implications. Performance Evaluation. 61:2-3. (181-201). Online publication date: 1-Jul-2005.

    https://doi.org/10.1016/j.peva.2004.11.008

  • Figueiredo D, Liu B, Feldmann A, Misra V, Towsley D and Willinger W. (2005). On TCP and self-similar traffic. Performance Evaluation. 61:2-3. (129-141). Online publication date: 1-Jul-2005.

    https://doi.org/10.1016/j.peva.2004.11.004

  • Ribeiro V, Zhang Z, Moon S and Diot C. (2005). Small-time scaling behavior of Internet backbone traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 48:3. (315-334). Online publication date: 21-Jun-2005.

    /doi/10.5555/1081434.1648603

  • Veitch D, Hohn N and Abry P. (2005). Multifractality in TCP/IP traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 48:3. (293-313). Online publication date: 21-Jun-2005.

    /doi/10.5555/1081434.1648602

  • Stoev S, Taqqu M, Park C and Marron J. (2005). On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 48:3. (423-445). Online publication date: 21-Jun-2005.

    /doi/10.5555/1081434.1648600

  • Park C, Hernández-Campos F, Marron J and Smith F. (2005). Long-range dependence in a changing Internet traffic mix. Computer Networks: The International Journal of Computer and Telecommunications Networking. 48:3. (401-422). Online publication date: 21-Jun-2005.

    /doi/10.5555/1081434.1648599

  • Rolls D, Michailidis G and Hernández-Campos F. (2005). Queueing analysis of network traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 48:3. (447-473). Online publication date: 21-Jun-2005.

    /doi/10.5555/1081434.1648597

  • Jiang H and Dovrolis C. (2005). Why is the internet traffic bursty in short time scales?. ACM SIGMETRICS Performance Evaluation Review. 33:1. (241-252). Online publication date: 6-Jun-2005.

    https://doi.org/10.1145/1071690.1064240

  • Jiang H and Dovrolis C. Why is the internet traffic bursty in short time scales?. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. (241-252).

    https://doi.org/10.1145/1064212.1064240

  • Li L and Lee G. (2005). DDoS Attack Detection and Wavelets. Telecommunications Systems. 28:3-4. (435-451). Online publication date: 1-Mar-2005.

    https://doi.org/10.1007/s11235-004-5581-0

  • Larrieu N and Owezarski P. (2005). Towards a Measurement Based Networking approach for Internet QoS improvement. Computer Communications. 28:3. (259-273). Online publication date: 1-Feb-2005.

    https://doi.org/10.1016/j.comcom.2004.10.002

  • Rawat S and Sastry C. Network intrusion detection using wavelet analysis. Proceedings of the 7th international conference on Intelligent Information Technology. (224-232).

    https://doi.org/10.1007/978-3-540-30561-3_24

  • Field T, Harder U and Harrison P. (2004). Network traffic behaviour in switched Ethernet systems. Performance Evaluation. 58:2+3. (243-260). Online publication date: 1-Nov-2004.

    https://doi.org/10.1016/j.peva.2004.07.017

  • Sommers J and Barford P. Self-configuring network traffic generation. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. (68-81).

    https://doi.org/10.1145/1028788.1028798

  • Magnaghi A, Hamada T and Katsuyama T. A wavelet-based framework for proactive detection of network misconfigurations. Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality. (253-258).

    https://doi.org/10.1145/1016687.1016691

  • Karagiannis T, Molle M and Faloutsos M. (2004). Long-Range Dependence. IEEE Internet Computing. 8:5. (57-64). Online publication date: 1-Sep-2004.

    https://doi.org/10.1109/MIC.2004.46

  • Varatkar G and Marculescu R. (2004). On-chip traffic modeling and synthesis for MPEG-2 video applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 12:1. (108-119). Online publication date: 1-Jan-2004.

    https://doi.org/10.1109/TVLSI.2003.820523

  • Soltani S, Simard P and Boichu D. (2004). Estimation of the self-similarity parameter using the wavelet transform. Signal Processing. 84:1. (117-123). Online publication date: 1-Jan-2004.

    https://doi.org/10.1016/j.sigpro.2003.05.002

  • Jiang H and Dovrolis C. Source-level IP packet bursts. Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. (301-306).

    https://doi.org/10.1145/948205.948245

  • Lan K and Heidemann J. A tool for RApid model parameterization and its applications. Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research. (76-86).

    https://doi.org/10.1145/944773.944786

  • Cui W and Bassiouni M. (2003). Virtual private network bandwidth management with traffic prediction. Computer Networks: The International Journal of Computer and Telecommunications Networking. 42:6. (765-778). Online publication date: 21-Aug-2003.

    https://doi.org/10.1016/S1389-1286(03)00217-2

  • Karagiannis T, Faloutsos M and Molle M. (2003). A user-friendly self-similarity analysis tool. ACM SIGCOMM Computer Communication Review. 33:3. (81-93). Online publication date: 1-Jul-2003.

    https://doi.org/10.1145/956993.957004

  • Chong K, Song H and Noh S. Traffic characterization of the web server attacks of worm viruses. Proceedings of the 2003 international conference on Computational science: PartII. (703-712).

    /doi/10.5555/1760988.1761072

  • Wu W, Michailidis G and Zhang D. General methodology 2. Proceedings of the 34th conference on Winter simulation: exploring new frontiers. (1958-1963).

    /doi/10.5555/1030453.1030744

  • Xia C, Liu Z, Squillante M, Zhang L and Malouch N. (2002). Traffic modeling and performance analysis of commercial web sites. ACM SIGMETRICS Performance Evaluation Review. 30:3. (32-34). Online publication date: 1-Dec-2002.

    https://doi.org/10.1145/605521.605534

  • Pesquet-Popescu B and Pesquet J. (2002). Synthesis of bidimensional α-stable models with long-range dependence. Signal Processing. 82:12. (1927-1940). Online publication date: 1-Dec-2002.

    https://doi.org/10.1016/S0165-1684(02)00320-1

  • Liljenstam M and Ogielski A. (2002). Crossover scaling effects in aggregated TCP traffic with congestion losses. ACM SIGCOMM Computer Communication Review. 32:5. (89-100). Online publication date: 1-Nov-2002.

    https://doi.org/10.1145/774749.774761

  • Figueiredo D, Liu B, Misra V and Towsley D. (2002). On the autocorrelation structure of TCP traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 40:3. (339-361). Online publication date: 22-Oct-2002.

    https://doi.org/10.1016/S1389-1286(02)00299-2

  • Partridge C, Cousins D, Jackson A, Krishnan R, Saxena T and Strayer W. Using signal processing to analyze wireless data traffic. Proceedings of the 1st ACM workshop on Wireless security. (67-76).

    https://doi.org/10.1145/570681.570689

  • Lan K and Heidemann J. (2002). Rapid model parameterization from traffic measurements. ACM Transactions on Modeling and Computer Simulation. 12:3. (201-229). Online publication date: 1-Jul-2002.

    https://doi.org/10.1145/643114.643117

  • Varatkar G and Marculescu R. Traffic analysis for on-chip networks design of multimedia applications. Proceedings of the 39th annual Design Automation Conference. (795-800).

    https://doi.org/10.1145/513918.514116

  • Molnár S, Dang T and Maricza I. On the Queue Tail Asymptotics for General Multifractal Traffic. Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications. (105-116).

    /doi/10.5555/647077.714777

  • Bianchi G, Mancuso V and Neglia G. Is Admission-Controlled Traffic Self-Similar?. Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications. (327-339).

    /doi/10.5555/647077.714773

  • Cremonesi P and Serazzi G. End-to-End Performance of Web Services. Performance Evaluation of Complex Systems: Techniques and Tools, Performance 2002, Tutorial Lectures. (158-178).

    /doi/10.5555/647414.725180

  • Feitelson D. Workload Modeling for Performance Evaluation. Performance Evaluation of Complex Systems: Techniques and Tools, Performance 2002, Tutorial Lectures. (114-141).

    /doi/10.5555/647414.725164

  • Borsos T. On the Temporal Characteristics of Video Traffic. Proceedings of the 26th Annual IEEE Conference on Local Computer Networks.

    /doi/10.5555/871717.871771

  • Huang P, Feldmann A and Willinger W. A non-instrusive, wavelet-based approach to detecting network performance problems. Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement. (213-227).

    https://doi.org/10.1145/505202.505229

  • Barford P and Plonka D. Characteristics of network traffic flow anomalies. Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement. (69-73).

    https://doi.org/10.1145/505202.505211

  • Lu X, Wang K and Dou H. Wavelet Multifractal Modeling for Network Traffic and Queueing Analysis. Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01).

    /doi/10.5555/850923.851440

  • Ma S and Ji C. (2001). Modeling heterogeneous network traffic in wavelet domain. IEEE/ACM Transactions on Networking. 9:5. (634-649). Online publication date: 1-Oct-2001.

    https://doi.org/10.1109/90.958331

  • Markovski V, Xue F and Trajković L. (2001). Simulation and Analysis of Packet Loss in User Datagram Protocol Transfers. The Journal of Supercomputing. 20:2. (175-196). Online publication date: 1-Sep-2001.

    https://doi.org/10.1023/A:1011134903609

  • Ritke R, Hong X and Gerla M. (2001). Contradictory relationship between Hurst parameter and queueing performance (extended version). Telecommunications Systems. 16:1-2. (159-175). Online publication date: 1-Jan-2001.

    https://doi.org/10.1023/A:1009063114616

  • Veres A, Molnár K and Vattay G. (2000). On the propagation of long-range dependence in the Internet. ACM SIGCOMM Computer Communication Review. 30:4. (243-254). Online publication date: 1-Oct-2000.

    https://doi.org/10.1145/347057.347551

  • Veres A, Molnár K and Vattay G. On the propagation of long-range dependence in the Internet. Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. (243-254).

    https://doi.org/10.1145/347059.347551

  • Roughan M, Veitch D and Abry P. (2000). Real-time estimation of the parameters of long-range dependence. IEEE/ACM Transactions on Networking. 8:4. (467-478). Online publication date: 1-Aug-2000.

    https://doi.org/10.1109/90.865075

  • Ryu B and Lowen S. Fractal Traffic Models for Internet Simulation. Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000).

    /doi/10.5555/844383.845479

  • Feldmann A, Gilbert A, Huang P and Willinger W. (1999). Dynamics of IP traffic. ACM SIGCOMM Computer Communication Review. 29:4. (301-313). Online publication date: 1-Oct-1999.

    https://doi.org/10.1145/316194.316235

  • Grossglauser M and Bolot J. (1999). On the relevance of long-range dependence in network traffic. IEEE/ACM Transactions on Networking. 7:5. (629-640). Online publication date: 1-Oct-1999.

    https://doi.org/10.1109/90.803379

  • Feldmann A, Gilbert A, Huang P and Willinger W. Dynamics of IP traffic. Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. (301-313).

    https://doi.org/10.1145/316188.316235

  • Ribeiro V, Riedi R, Crouse M and Baraniuk R. (1999). Simulation of nonGaussian long-range-dependent traffic using wavelets. ACM SIGMETRICS Performance Evaluation Review. 27:1. (1-12). Online publication date: 1-Jun-1999.

    https://doi.org/10.1145/301464.301475

  • Ribeiro V, Riedi R, Crouse M and Baraniuk R. Simulation of nonGaussian long-range-dependent traffic using wavelets. Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. (1-12).

    https://doi.org/10.1145/301453.301475

  • Feldmann A, Gilbert A and Willinger W. (1998). Data networks as cascades. ACM SIGCOMM Computer Communication Review. 28:4. (42-55). Online publication date: 1-Oct-1998.

    https://doi.org/10.1145/285243.285256

  • Feldmann A, Gilbert A and Willinger W. Data networks as cascades. Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication. (42-55).

    https://doi.org/10.1145/285237.285256

  • Feldmann A, Gilbert A, Willinger W and Kurtz T. (1998). The changing nature of network traffic. ACM SIGCOMM Computer Communication Review. 28:2. (5-29). Online publication date: 1-Apr-1998.

    https://doi.org/10.1145/279345.279346

  • Paxson V. (1997). Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic. ACM SIGCOMM Computer Communication Review. 27:5. (5-18). Online publication date: 1-Oct-1997.

    https://doi.org/10.1145/269790.269792