نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

In this paper, the stability analysis and control design of heterogeneous traffic flow is considered. It is assumed that the traffic flow consists of infinite number of cooperative non-identical vehicular platoons. Two different networks are investigated in stability analysis of heterogeneous traffic flow: 1) inter-platoon network which deals with the communication topology of lead vehicles and...

Journal: :Appl. Soft Comput. 2015
Gianni D'Angelo Francesco Palmieri Massimo Ficco Salvatore Rampone

The main aim in network anomaly detection is effectively spotting hostile events within the traffic pattern associated to network operations, by distinguishing them from normal activities. This can be only accomplished by acquiring the a-priori knowledge about any kind of hostile behavior that can potentially affect the network (that is quite impossible for practical reasons) or, more easily, b...

2006
Jonathan Paisley

Dynamic engineering of application-specific network traffic is becoming more important for applications that consume large amounts of network resources, in particular, bandwidth. Since traditional traffic engineering approaches are static they cannot address this trend; hence there is a need for real-time traffic classification to enable dynamic traffic engineering. A packet flow monitor has be...

Journal: :Computer Networks 2009
Thomas Silverston Olivier Fourmaux Alessio Botta Alberto Dainotti Antonio Pescapè Giorgio Ventre Kavé Salamatian

The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communiti...

Journal: :JORS 2005
Ben J. Waterson Tom J. Cherrett M. McDonald

Automatic incident detection is becoming one of the core tools of urban traffic management, enabling more rapid identification and response to traffic incidents and congestion. The existing traffic detection infrastructure within many urban areas (often installed for traffic signal optimisation) provides urban traffic control systems with a near continuous stream of data on the state of traffic...

2015
Hasan Omar Al-Sakran

In recent years popularity of private cars is getting urban traffic more and more crowded. As result traffic is becoming one of important problems in big cities in all over the world. Some of the traffic concerns are congestions and accidents which have caused a huge waste of time, property damage and environmental pollution. This research paper presents a novel intelligent traffic administrati...

Journal: :Computers & Security 2014
Asaf Shabtai Lena Tenenboim-Chekina Dudu Mimran Lior Rokach Bracha Shapira Yuval Elovici

In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application’s network behavior. The main goal of the proposed system is to protect mobile device users and cellular infrastructure companies from malicious applications by: (1) identification of malicious attacks or masquerading applications installed on a mobile device, and (2...

Journal: :CoRR 2006
Henry N. Jerez Joud Khoury Chaouki T. Abdallah

This paper describes a new architecture for transient mobile networks destined to merge existing and future network architectures, communication implementations and protocol operations by introducing a new paradigm to data delivery and identification. The main goal of our research is to enable seamless end-to-end communication between mobile and stationary devices across multiple networks and t...

2014
Martin Husák Jan Vykopal

With the rising number of cyber threats in communication networks, there is a demand for attack analysis and the identification of new threats. Honeypots, tools for attack analysis and zero-day exploit discovery, are passive in waiting for an attacker. This paper proposes a novel approach to the effective utilization of honeypots based on cooperation between honeypots and the network in which t...

2017
Hao WU

Security data fusion is fundamental and essential for intelligent traffic systems. A dynamic data fusion scheme is proposed to guarantee the security and accuracy of sensed data. It is used to collect and manage multi-source traffic messages. It improves K-neighbor nonparametric regression method on the basis of repeated occurrence feature of traffic flow state mode. Double-screening for neighb...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید