1 |
Lineage II. http://www.lineage2.co.kr/.
|
2 |
L.J. Gleser and D.S. Moore, "The Effect of Dependence on Chi-Squared and Empiric Distribution Tests of Fit," Annals of Statistics, vol. 11, no. 4, 1983, pp. 1100-1108.
DOI
|
3 |
N. Williams, S. Zander, and G. Armitage, "Evaluating Machine Learning Algorithms for Automated Network Application Identification," Technical Report 060401B, CAIA, Swinburne Univ., Apr. 2006.
|
4 |
M. Kantardzic, Data Mining: Concepts, Methods, and Algorithms, Wiley-IEEE Press, 2003.
|
5 |
Perl programming language. http://www.perl.org/.
|
6 |
W.C. Feng, F. Chang, and J. Walpole, "A Traffic Characterization of Popular On-line Games," IEEE/ACM Trans. Networking, vol. 13, no. 3, 2005, pp. 488-500.
DOI
|
7 |
T. Henderson and S. Bhatti, "Networked Games: A QoS-Sensitive Application for QoS-Insensitive Users?" Proc. ACM SIGCOMM Workshop on Revisiting IP QoS: What Have We Learned, Why Do We Care? 2003, pp. 141-147.
|
8 |
A. Dainotti, A. Pescape, and G. Ventre, "A Packet-Level Traffic Model of Starcraft," Proc. HOT-P2P 2nd Int. Workshop Hot Topics in Peer-to-Peer Systems, San Diego, USA, 2005, pp. 33-42.
|
9 |
K.T. Chen, P. Huang, and C.L. Lei, "Game Traffic Analysis: An MMORPG Perspective," Computer Networks, vol. 50, no. 16, 2006, pp. 3002-3023.
DOI
ScienceOn
|
10 |
J. Kim et al., "Traffic Characteristics of a Massively Multi-player Online Role Playing Game," Proc. NetGames, Oct. 2005, pp. 1-8.
|
11 |
Internet Assigned Numbers Authority (IANA) port number list. http://www.iana.org/assignments/port-numbers.
|
12 |
L. Liang, Z. Sun, and H Cruickshank, "Relative QoS Optimization for Multiparty Online Gaming in DiffServ Networks," IEEE Commun. Mag., vol. 43, May 2005, pp. 75-83.
DOI
|
13 |
Game genres. http://en.wikipedia.org/wiki/Game_genres.
|
14 |
G. Armitage, M. Claypool, and P. Branch, Networking and Online Games: Understanding and Engineering Multiplayer Internet Game, John Wiley and Sons, 2006, pp. 150-173.
|
15 |
Game chart. http://www.gamechart.co.kr/.
|
16 |
A. Kind et al., "Advanced Network Monitoring Brings Life to the Awareness Plane," IEEE Commun. Mag., vol. 46, Oct. 2008, pp. 140-146.
|
17 |
M. Crotti et al., "Traffic Classification through Simple Statistical Fingerprinting," ACM SIGCOMM Computer Commun. Review, vol. 37, no. 1, Jan. 2007, pp. 5-16.
DOI
ScienceOn
|
18 |
J. But et al., "Evaluating Machine Learning Methods for Online Game Traffic Identification," Proc. 5th ACM SIGCOMM Workshop on Network and System Support for Games, Technical Report 060410C, CAIA, Apr. 2006.
|
19 |
D.J. Parish et al., "Using Packet Size Distributions to Identify Real-Time Networked Applications," IEE Commun., vol. 150, Aug. 2003, pp. 221-227.
DOI
ScienceOn
|
20 |
K. Tsutomu et al., "Traffic Identification for Dependable VoIP," NEC Technical J., vol. 1, no. 3, 2006, pp. 17-20.
|
21 |
N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification," ACM SIGCOMM Computer Commun. Review, vol. 36, no. 5, Oct. 2006, pp. 5-16.
DOI
ScienceOn
|
22 |
Gundam-Online (GO). http://gundam.netmarble.net/.
|
23 |
J. Erman, M. Arlitt, and A. Mahanti, "Internet Traffic Classification Using Clustering Algorithms," Proc. ACM SIGCOMM Workshop Mining Network Data, 2006, pp. 281-286.
|
24 |
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, 1999, pp. 2435-2463.
DOI
ScienceOn
|
25 |
S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," Proc. 13th Int. Conf. World Wide Web, 2004, pp. 512-521.
|
26 |
M.S. Kim, Y.J. Won, and J.W.K. Hong, "Application-Level Traffic Monitoring and an Analysis on IP Networks," ETRI J., vol. 27, no. 1, 2005, pp. 22-42.
과학기술학회마을
DOI
ScienceOn
|
27 |
T. Karagiannis et al., "Transport Layer Identification of P2P Traffic," Proc. 4th ACM SIGCOMM Conf. Internet Measurement, 2004, pp. 121-134.
|
28 |
A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification," Proc.14th IEEE Int. Symp. Modeling, Analysis, and Simulation, Sept. 2006, pp. 179-188.
|
29 |
Stracraft. http://www.blizzard.co.kr/starcraft/.
|
30 |
KartRider. http://kart.nexon.com/.
|
31 |
Sudden Attack (SA). http://suddenattack.netmarble.net/.
|
32 |
World of Warcraft (WoW). http://www.worldofwarcraft.com/.
|
33 |
Dungeon and Fighter (D&F). http://df.hangame.com/.
|
34 |
Maple Story (M.S). http://maplestory.nexon.net/.
|
35 |
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multilevel Traffic Classification in the Dark," Proc. ACM SIGCOMM, Aug. 2005, pp. 229-240.
|
36 |
A.W. Moore and D. Zuev, "Internet Traffic Classification Using Bayesian Analysis Techniques," Proc. SIGMETRICS, June 2005, pp. 50-60.
|
37 |
A.W. Moore, "Discriminators for Use in Flow-Based Classification," Technical Report, Intel Research, Cambridge, 2005.
|
38 |
M.S. Borella, "Source Models of Network Game Traffic," Computer Commun., vol. 23, no. 4, Feb. 2000, pp. 403-410.
DOI
ScienceOn
|
39 |
J. Farber, "Network Game Traffic Modelling," Proc. 1st Workshop Network and System Support for Games, Bruanschweig, Germany, 2002, pp. 53-57.
|
40 |
T. Henderson and S. Bhatti, "Modeling User Behaviour in Networked Games," Proc. 9th ACM Int. Conf. Multimedia, 2001, pp. 212-220.
|
41 |
T. Lang, P. Branch, and G. Armitage, "A Synthetic Traffic Model for Quake3," Proc. ACM SIGCHI Int. Conf. Advances in Computer Entertainment Technol., Singapore, June 2004.
|
42 |
S. McCreary and K. Claffy, "Trends in Wide Area IP Traffic Patterns: A View from Ames Internet Exchange," Proc. 13th ITC Specialist Seminar on Measurement and Modeling of IP Traffic, Sept. 2000, pp. 1-11.
|
43 |
K. Jegers and M. Wiberg, "Pervasive Gaming in the Everyday World," IEEE Pervasive Computing, vol. 5, 2006, pp.78-85.
|