نتایج جستجو برای: http traffic analysis
تعداد نتایج: 2996689 فیلتر نتایج به سال:
HTTP-based video streaming has become popular in recent years, with Dynamic Adaptive Streaming over HTTP (DASH) emerging as an ISO/IEC standard for live and on-demand video streaming services. Netflix and YouTube employ DASH-like streaming strategies and account for more than 50% of North American traffic in 2015, representing a significant source of Internet traffic. Consumer video streams are...
one of the most important issues in urban planning is developing sustainable public transportation. the basic condition for this purpose is analyzing current condition especially based on data. data mining is a set of new techniques that are beyond statistical data analyzing. clustering techniques is a subset of it that one of it’s techniques used for analyzing passengers’ trip. the result of t...
A recent report has shown that there are more than 5,000 malicious applications created for Android devices each day. This creates a need for researchers to develop effective and efficient malware classification and detection approaches. To address this need, we introduce DroidClassifier: a systematic framework for classifying network traffic generated by mobile malware. Our approach utilizes n...
short-term traffic flow forecasting plays a significant role in the intelligent transportation systems (its), especially for the traffic signal control and the transportation planning research. two mainly problems restrict the forecasting of urban freeway traffic parameters. one is the freeway traffic changes non-regularly under the heterogeneous traffic conditions, and the other is the success...
Video is increasingly becoming one of the most pervasive technologies in terms of everyday usage, both for entertainment and in the enterprise environments. Mobile video is responsible for a majority of the growth seen in mobile broadband data volume. Video streaming on mobile devices is on the rise. According to recent reports, mobile video streaming traffic accounted for 52.8% of total mobile...
the paper discusses the current state of research concerning railway network timetabling and traffic management. timetable effectiveness is governed by frequency, regularity, accurate running, recovery and layover times, as well as minimal headway, buffer times and waiting times. analytic (queuing) models and stochastic microsimulation are predominantly used for estimation of waiting times and ...
Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted...
“Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit” http://www.torproject.org. Indeed, as first demonstrated in [1] and bolstered by many follow up studies since, timing a...
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that can be detected using traffic analysis. It is delivered by a malicious exit node using a man-in-themiddle attack on HTTP. Both the attack and the traffic analysis can be performed by an adversary with limited resources. W...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید