نتایج جستجو برای: traffic analysis
تعداد نتایج: 2898804 فیلتر نتایج به سال:
Research Wavelet Methods for the Detection of Anomalies and their Application to Network Traffic Analysis D. W. Kwon1, K. Ko2, M. Vannucci3,∗,†, A. L. N. Reddy4 and S. Kim3 1Radiation Epidemiology Branch, Division of Cancer Epidemiology and Genetics, National Cancer Institute, 6120 Executive Boulevard, Rockville, MD 20852, U.S.A. 2Department of Mathematics, Boise State University, ID, U.S.A. 3D...
To ensure that time constraints in real-time systems are satisfied it is necessary to verify the real-time behavior during the design process of such systems. Schedulabilitiy analysis approaches can be used for this. The disadvantage of these methods is that sometimes the calculated bounds are an overestimation of the real behavior of the system. Therefore it is necessary to include the system ...
vii Abstrakt (Abstract in Czech) viii
Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental communication primitive is necessarily one-to-one, so protocols addressing anonymity tend to resort to the composition of multiple elementary transmissions in order to frustrate traffic analysis. This paper builds on a case st...
In this paper we provide a detailed convergence analysis for an unconditionally energy stable, second order accurate convex splitting scheme for the modified phase field crystal equation, a generalized damped wave equation for which the usual phase field crystal equation is a special degenerate case. The fully discrete, fully second order finite difference scheme in question was derived in a re...
In Mobile IPv6, each packet sent and received by a mobile node contains its home address. As a result, it is very easy for an eavesdropper or for a correspondent node to track the movement and usage of a mobile node. This paper proposes a simple and practical solution to this problem. The main idea is to replace the home address in the packets by a temporary mobile identifier (TMI), that is cry...
Online simulation of pedestrian flow in public buildings is a new tool which can be especially useful for improving the aspects of safety and short-term planning in the phase of organizing and operating large public buildings. These might be places such as a train station, an airport or a shopping center. This paper provides an insight into the different concepts of pedestrian flow simulation. ...
In this paper we introduce an application for the Virtual Traffic Laboratory. We have seamlessly integrated the analyses of aggregated information from simulation and measurements in a Matlab environment, in which one can concentrate on finding the dependencies of the different parameters, select subsets in the measurements, and extrapolate the measurements via simulation. Available aggregated ...
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
Data traffic raises dramatically in recent years. The burst of data demands for high capacity of communication networks. This brings more challenges for the industry. Forecast of traffic growth becomes important. Based on the traffic forecast, the industry can design a long-term strategy for communication development. To evaluate traffic forecast result, proper methodology is required. In this ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید