منابع مشابه
Traffic gridlock on a honeycomb city.
Inspired by an old and almost in oblivion urban plan, we report the behavior of the Biham-Middleton-Levine (BML) model-a paradigm for studying phase transitions of traffic flow-on a hypothetical city with a perfect honeycomb street network. In contrast with the original BML model on a square lattice, the same model on a honeycomb does not show any anisotropy or intermediate states, but a single...
متن کاملTraffic Dynamics on Complex Networks: A Survey
Traffic dynamics on complex networks are intriguing in recent years due to their practical implications in real communication networks. In this survey, we give a brief review of studies on traffic routing dynamics on complex networks. Strategies for improving transport efficiency, including designing efficient routing strategies and making appropriate adjustments to the underlying network struc...
متن کاملEffect of random failures on traffic in complex networks
We study the effect of random removal of nodes in networks on the maximum capability to deliver information in communication processes. Measuring the changes on the onset of congestion, we observe different behaviors depending on the network structure, governed by the distribution of the algorithmic betweenness (number of paths traversing a node given a communication protocol) of the nodes, and...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physica A: Statistical Mechanics and its Applications
سال: 2012
ISSN: 0378-4371
DOI: 10.1016/j.physa.2011.07.046