نتایج جستجو برای: http traffic analysis

تعداد نتایج: 2996689  

1996
Michael G. Reed Paul F. Syverson David M. Goldschlag

Using traffic analysis, it is possible to infer who is talking to whom over a public network. This paper describes a flexible communications infrastructure, onion routing, which is resistant to traffic analysis. Onion routing lives just beneath the application layer, and is designed to interface with a wide variety of unmodified Internet services by means of proxies. Onion routing has been impl...

2014
Sateesh Kumar Muppasani Vijaya Durga Reddy

Objective This is a retrospective study of trauma cases from January 2007-December 2009 (212 patients) to determine the incidence of gender, age, alcohol influence, mode of injury, time of injury, nature of injuries, hospital stay and to suggest preventive methods. Methods This is a retrospective study of trauma cases from January 2007-December 2009 (212 patients). After obtaining permission fr...

2004
David A. Kennedy Sebastian Zander

For collecting information about game traffic characteristics and user behaviour, we are setting up a public game server that runs a few different game servers. We also want to run a web server on the same machine, to provide users with information about the server and the games. The web traffic then would interfere with the game traffic. In this paper we want to find out whether the web traffi...

2000
Agung Prasetijo Paul Ashley Mark Looi Andrew J. Clark Gary Gaskell

From 1st January 2000, Internet Service Providers in Australia have been required to filter web traffic content. The Australian Broadcasting Authority (ABA) publishes a list of banned web sites and ISPs must enforce this ban. Enforcing Internet content regulation is a security issue: ISPs need to be able to verify the authenticity of a distributed banned list, enforcement will most likely be pe...

2016
Alex Maltinsky Ran Giladi Yuval Shavitt

Network level surveillance, censorship, and various man-in-the-middle attacks target only specific types of network traffic (e.g., HTTP, HTTPS, VoIP, or Email). Therefore packets of these types will likely receive ”special” treatment by a transit network or a man-in-the-middle attacker. A transit ISP or an attacker may pass the targeted traffic through special software or equipment to gather da...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده فنی و مهندسی 1388

الحاق و پیوند ترافیک از جفت فرستنده-گیرنده های مختلف به مسیر نوری پرظرفیت ، آرایش ترافیک یا همان traffic grooming نامیده می شود. در این پایان نامه، به بررسی و ارائه الگوریتمی جهت آرایش ترافیک (traffic grooming) در شبکه های ip-over-wdm می پردازیم که برپایه بهینه سازی به روش کلونی مورچه ها (acs) بنا شده است و از تابع احتمالی که به دو پارامتر هزینه و مقدار فرومون وابسته است استفاده می کند. در ادا...

2002
Manish Bhide Krithi Ramamritham Prashant J. Shenoy

Consider a continuous query where a user wants to be informed when the net worth of his/her stock portfolio changes by more than a specified threshold. In this paper we develop a data dissemination technique for the Web where (a) such queries access data from multiple sources and (b) the HTTP protocol – which is inherently pull based – is used for accessing the sources. Key challenges in suppor...

2007
Hung Son Nguyen

This task is co-organized by Gemius SA, the leading Internet market research agency in Central and Eastern Europe. The problem objective is to predict user behaviour by characterising nature of user’s visit, i.e., the list categories of the visited Internet portal and the number of page views in each category. The challenge is accomplished with use of web trafic data from Polish web sites emplo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید