نتایج جستجو برای: http traffic analysis

تعداد نتایج: 2996689  

2016
Jonathan Kua Grenville Armitage

HTTP-based video streaming has become popular in recent years, with Dynamic Adaptive Streaming over HTTP (DASH) emerging as an ISO/IEC standard for live and on-demand video streaming services. Netflix and YouTube employ DASH-like streaming strategies and account for more than 50% of North American traffic in 2015, representing a significant source of Internet traffic. Consumer video streams are...

Journal: :international journal of industrial engineering and productional research- 0
seyed omid hasanpour jesri amirkabir university of tehran, tehran, iran abbas ahmadi amirkabir university of tehran, tehran, iran behrooz karimi amirkabir university of tehran, tehran, iran mohsen akbarpour amirkabir university of tehran, tehran, iran

one of the most important issues in urban planning is developing sustainable public transportation. the basic condition for this purpose is analyzing current condition especially based on data. data mining is a set of new techniques that are beyond statistical data analyzing. clustering techniques is a subset of it that one of it’s techniques used for analyzing passengers’ trip. the result of t...

2016
Zhiqiang Li Lichao Sun Qiben Yan Witawas Srisa-an Zhenxiang Chen

A recent report has shown that there are more than 5,000 malicious applications created for Android devices each day. This creates a need for researchers to develop effective and efficient malware classification and detection approaches. To address this need, we introduce DroidClassifier: a systematic framework for classifying network traffic generated by mobile malware. Our approach utilizes n...

Journal: :international journal of civil engineering 0
l. zhang beijing university of technology

short-term traffic flow forecasting plays a significant role in the intelligent transportation systems (its), especially for the traffic signal control and the transportation planning research. two mainly problems restrict the forecasting of urban freeway traffic parameters. one is the freeway traffic changes non-regularly under the heterogeneous traffic conditions, and the other is the success...

2014
Karishma Talan

Video is increasingly becoming one of the most pervasive technologies in terms of everyday usage, both for entertainment and in the enterprise environments. Mobile video is responsible for a majority of the growth seen in mobile broadband data volume. Video streaming on mobile devices is on the rise. According to recent reports, mobile video streaming traffic accounted for 52.8% of total mobile...

Journal: :international journal of civil engineering 0
i.a. hansen delft university of technology

the paper discusses the current state of research concerning railway network timetabling and traffic management. timetable effectiveness is governed by frequency, regularity, accurate running, recovery and layover times, as well as minimal headway, buffer times and waiting times. analytic (queuing) models and stochastic microsimulation are predominantly used for estimation of waiting times and ...

2007
Christian Seifert Peter Komisarczuk Radu Muschevici Ian Welch

Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted...

2013
Parv Venkitasubramaniam

“Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit” http://www.torproject.org. Indeed, as first demonstrated in [1] and bolstered by many follow up studies since, timing a...

2007
Timothy G. Abbott Katherine J. Lai Michael R. Lieberman Eric C. Price

This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that can be detected using traffic analysis. It is delivered by a malicious exit node using a man-in-themiddle attack on HTTP. Both the attack and the traffic analysis can be performed by an adversary with limited resources. W...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید