01356aam 2200421I 450 991071123620332120151113033659.0GOVPUB-C13-365341d75c6d83611e4822885eab418b(CKB)5470000002481661(OCoLC)929064012(EXLCZ)99547000000248166120151113d1974 ua 0engrdacontentrdamediardacarrierTensile behavior of boron /Daniel J. ChwirutGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1974.1 online resourceNBS technical note ;8121974.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Title from PDF title page.Includes bibliographical references.Aluminum alloysEpoxy compoundsAluminum alloys.Epoxy compounds.Chwirut Daniel J1390278Chwirut Daniel J1390278United States.National Bureau of Standards.NBSNBSGPOBOOK9910711236203321Tensile behavior of boron3523951UNINA05597nam 2200481 450 99654937030331620220831164151.0981-16-8324-7981-16-8325-5981-16-8325-5(MiAaPQ)EBC6827684(Au-PeEL)EBL6827684(CKB)20151634200041(OCoLC)1289368542(PPN)259391123(EXLCZ)992015163420004120220831d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierNetwork behavior analysis measurement, models, and applications /Kuai XuSingapore :Springer,[2021]©20211 online resource (170 pages)Print version: Xu, Kuai Network Behavior Analysis Singapore : Springer Singapore Pte. Limited,c2022 9789811683244 Intro -- Preface -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 What is Network Behavior Analysis -- 1.2 Network Behavior Measurement and Modeling -- 1.3 Benefits of Network Behavior Analysis -- 1.4 Book Overview and Organization -- References -- 2 Background of Network Behavior Analysis -- 2.1 Internet Measurement and Analysis -- 2.2 Data Collection for Network Behavior Analysis -- 2.3 Preliminaries of Network Behavior Analysis -- 2.3.1 Information Theory and Entropy -- 2.3.2 Graphical Analysis -- References -- 3 Behavior Modeling of Network Traffic -- 3.1 Behavior-Oriented Network Traffic Modeling -- 3.1.1 What is Network Behavior -- 3.1.2 Traffic Features in Network Behavior -- 3.1.3 Behavioral Entities -- 3.1.4 Real-World Network Traffic Datasets -- 3.2 Identifying Significant Behavioral Entities -- 3.2.1 Significant Behavioral Entities -- 3.2.2 Adaptive Thresholding Algorithm -- 3.2.3 Extracting Significant Traffic Clusters -- 3.3 Network Behavior Modeling -- 3.3.1 Network Behavior Modeling -- 3.3.2 Network Behavior Classifications -- 3.4 Network Behavior Dynamics -- 3.4.1 Temporal Properties of Behavior Classes -- 3.4.2 Behavior Dynamics of Individual Clusters -- 3.5 Summary -- References -- 4 Structural Modeling of Network Traffic -- 4.1 Communication Structure Analysis -- 4.1.1 Dominant State Analysis -- 4.1.2 Communication Structure of Networked Systems and Internet Applications -- 4.2 Exploring More Traffic Features -- 4.3 Summary -- References -- 5 Graphical Modeling of Network Traffic -- 5.1 Cluster-Aware Network Behavior Analysis -- 5.2 Modeling Host Communications with Bipartite Graphs and One-Mode Projections -- 5.3 Similarity Matrices and Clustering Coefficient of One-Mode Projection Graphs -- 5.3.1 Similarity Matrices -- 5.3.2 Clustering Coefficients -- 5.4 Discovering Behavior Clusters via Clustering Algorithms.5.4.1 Partitioning Similarity Matrix with Spectral Clustering Algorithm -- 5.4.2 Clustering Analysis of Internet Applications -- 5.5 Traffic Characteristics and Similarity of Behavior Clusters -- 5.5.1 Making Sense of End-Host Behavior Clusters -- 5.5.2 Distinct Traffic Characteristics of Behavior Clusters -- 5.5.3 Exploring Similarity of Internet Applications -- 5.6 Summary -- References -- 6 Real-Time Network Behavior Analysis -- 6.1 Real-Time Network Measurement and Monitoring -- 6.2 Real-Time System for Network Behavior Analysis -- 6.2.1 Design Guidelines -- 6.2.2 System Architecture -- 6.2.3 Key Implementation Details -- 6.3 Performance Evaluation -- 6.3.1 Benchmarking -- 6.3.2 Stress Test -- 6.4 Sampling and Filtering -- 6.4.1 Random Sampling -- 6.4.2 Profiling-Aware Filtering -- 6.5 Summary -- References -- 7 Applications -- 7.1 Profiling Internet Traffic -- 7.1.1 Server/Service Behavior Profiles -- 7.1.2 Heavy-Hitter Host Behavior Profiles -- 7.1.3 Scan/Exploit Profiles -- 7.1.4 Deviant or Rare Behaviors -- 7.2 Reducing Unwanted Traffic on the Internet -- 7.2.1 Unwanted Exploit Traffic on the Internet -- 7.2.2 Characteristics of Unwanted Exploit Traffic -- 7.2.3 Strategies of Reducing Unwanted Traffic -- 7.2.4 Sequential Behavior Analysis -- 7.3 Cluster-Aware Applications of Network Behavior Analysis -- 7.3.1 End-Host Network Behavior Clusters -- 7.3.2 Network Application Behavior Clusters -- 7.4 Summary -- References -- 8 Research Frontiers of Network Behavior Analysis -- 8.1 Network Behavior Analysis in the Cloud -- 8.1.1 Background -- 8.1.2 Profiling-as-a-Service in the Cloud -- 8.1.3 Architecture of Profiling-as-a-Service for Network Behavior Analysis -- 8.1.4 Designing the Profiling-as-a-Service Infrastructure -- 8.2 Network Behavior Analysis in Smart Homes -- 8.2.1 Background -- 8.2.2 Traffic Monitoring Platform for Home Networks.8.2.3 Characterizing Home Network Traffic -- 8.2.4 Unwanted Traffic Towards Home Networks -- 8.3 Network Behavior Analysis for Internet of Things -- 8.3.1 Background -- 8.3.2 IoT Traffic Measurement and Monitoring -- 8.3.3 An IoT Traffic Measurement Framework via Programmable Edge Routers -- 8.3.4 Multidimensional Behavioral Profiling of IoT Devices -- 8.3.5 Exploring the Applications of Multidimensional Behavioral Profiling -- 8.4 Summary -- References.InternetManagementComputer networksManagementInternetManagement.Computer networksManagement.004.678Xu Kuai1080936MiAaPQMiAaPQMiAaPQBOOK996549370303316Network behavior analysis3558726UNISA