نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

Sh. Toobaie and H. Z. Aashtiani,

Solving traffic equilibrium problem, or “traffic assignment”, as the last step in Transportation Planning, distributes OD trip demands of a transportation network over the network links with regard to Traffic Equilibrium Law, and estimates the link flows. In formulations of traffic equilibrium which are based on path saving, the memory consumption is considerably affected by the number of effct...

Abolghasem Sadeghi-Niaraki, Somaiieh Rokhsari,

Risk assessment of urban network using traffic indicators determines vulnerable links with high danger of traffic incidents. Thus Determination of an appropriate methodology remains a big challenge to achieve this objective. This paper proposed a methodology based on data fusion concept using Fuzzy-AHP and TOPSIS to achieve this aim. The proposed methodology tries to overcome two main problems,...

Journal: :Computer Networks 2006
Lorne Mason Anton Vinokurov Ning Zhao David Plant

In this thesis, we present the identification of methods and tools for the design and analysis of an Agile All-Photonic Network (AAPN). This thesis discusses the layered topology which comprises of a set of overlaid star/tree networks, with an optical core space switch at each of the star centers and hybrid photonic/electronic switches at the edges, and optionally, with Multiplexer/Selectors in...

2000
Rajiv S. Pimplaskar

This paper describes protocol simulation and its application in performance modeling and analysis. Windows NT and NetWare subnets of the School of Engineering at Widener University were considered as the problem domain. The protocol stacks analyzed include IPX/SPX, TCP/IP, NetBEUI and AppleTalk. Analysis was conducted on 1.2 GB of data gathered daily over a period of two months by a network mon...

1999
C. Casetti R. Lo Cigno M. Mellia

This paper presents a load balancing method to improve network utilization when static routing algorithms are employed. Static routing algorithms can generally be reduced to a path assignment problem with the aim of minimizing a cost function: i.e., maximizing network revenues. Unfortunately the problem, when multiple constraints such as different QoS traffic classes are present, is computation...

2013
Yonggang Wang Chunbo Zhang

Subject review Emergency traffic management calls for integration of strategies covering advanced information collecting/disseminating fallibilities, and effective message broadcast system. Approximate "permanent" alternate routes combining intelligent transportation system measures could objectively play a vital role in supporting the category of specific congestion alleviation and incident ma...

2007
Ming Ye G. Premkumar Dan Zhu

Network attacks have become a significant threat to organizations and effective intrusion detection systems have to be developed detect these attacks before they inflict harm to the internal network infrastructure. Denial of service (DoS) and probing attacks are the most common attacks. While time-based traffic features provide information to identify attacks, size-based traffic features enhanc...

2009
Alberto Dainotti Walter de Donato Antonio Pescapè

The research on network traffic classification has recently become very active. The research community, moved by increasing difficulties in the automated identification of network traffic, started to investigate classification approaches alternative to port-based and payload-based techniques. Despite the large quantity of works published in the past few years on this topic, very few implementat...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Super host refers to the that has a high cardinality or exhibits big change in network. Facing big-volume network traffic, sketches have been widely applied identify super hosts an efficient and accurate way. However, most cannot flexibly balance memory usage accuracy estimation. Setting inappropriate counter size for sketch could either lead inaccurate estimation cause waste. In order solve th...

Journal: :Wireless Communications and Mobile Computing 2022

The encryption of network traffic promotes the development encrypted classification and identification research. However, many existing studies are only effective for closed-set experimental data, that is to say, known classes, while there often lots unknown classes in real environment open sets, have difficulty identifying can misclassify them as classes. How identify classify an open-collecti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید