نتایج جستجو برای: traffic phase detection
تعداد نتایج: 1223932 فیلتر نتایج به سال:
automatic road extraction from aerial images can be very helpful in traffic control and vehicle guidance systems. most of the road detection approaches are based on image segmentation algorithms. color-based segmentation is very sensitive to light changes and consequently the change of weather condition affects the recognition rate of road detection systems. in order to reduce the light change ...
Botnets are a major security threat to today’s Internet. Therefore, the detection of botnets has become a central task for network administrators. In this paper, we study the detection of botnets by monitoring and analyzing the Command and Control (C2) channels communication traffic. We note that this detection approach is effective as it detects a botnet before it engages in any harmful activi...
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the network traffic data is acquired by hardware accelerated probes in NetFlow format and preprocessed before processing by the detection agent. The proposed detection algorithm is based on extension of trust modeling techniqu...
Uncovering anomalies in large ISPs and enterprise networks is challenging because of the wide variety of such anomalies. They can come from activity with malicious intentions (e.g., scanning, DDoS, prefix hijacking), or from misconfigurations and failures of network components (e.g., link failures, routing problems, outages in measurement equipment). In the literature, the problem of detecting ...
Nowadays, because of the growing numbers of vehicles on streets and roads, the use of intelligent controlsystems to improve driving safety and health has become a necessity. To design and implement suchcontrol systems, having information about traffic light colors is essential. There are the wide variety oftraffic lights in terms of light intensity and color. Therefore it seems that design and ...
We develop an algorithm for generating secure shell (ssh) network traffic that can find use as a part of a testbed for evaluating anomaly detection and intrusion detection systems in cyber security. Given an initial dataset describing real network traffic, the generator produces synthetic traffic with characteristics close to the original. The objective is to match parameters of the original tr...
This paper reviews the popular traffic sign detection methods prevalent in recent literature. The methods are divided into three categories: color-based, shape-based, and learningbased. Color-based detection methods from eleven different works are studied and summarized in a table for easy reference. Three shape-based detection methods are presented, and a recent method based on Hough transform...
This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today’s social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of netw...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید