نتایج جستجو برای: traffic phase detection
تعداد نتایج: 1223932 فیلتر نتایج به سال:
Real-world constraint problems abound with uncertainty. Problems with incomplete or erroneous data are often simplified at present to tractable deterministic models, or modified using error correction methods, with the aim of seeking a solution. However, this can lead us to solve the wrong problem because of the approximations made, an outcome of little help to the user who expects the right pr...
Traffic lights play an imperative role in traffic management. Traffic lights play an important role in the traffic management. Existing Automatic Traffic Light Violation Detection System is based on the camera’s to detect the violator. This system has a number of limitations like blurry image due to motion , poor image resolution because the number plate is far away, poor lightening, different ...
Despite the long literature and assorted list of proposed systems for performing detection and classification of anomalies in operational networks, Internet Service Providers (ISPs) are still looking for effective means to manage the ever-growing number of network traffic anomalies they face in their daily business. In this paper we address the problem of automatic network traffic anomaly detec...
Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation). The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of d...
A Distributed Denial of Service (DDoS) attack is a major security threat for networks and Internet services. Attackers can generate attack traffic similar to normal network traffic using sophisticated attacking tools. In such a situation, many intrusion detection systems fail to identify DDoS attack in real time. However, DDoS attack traffic behaves differently from legitimate network traffic i...
The automated detection of atypical and critical traffic situations is essentially important to help to understand driver behaviour, to find functional correlations between traffic conflicts and real accidents, and eventually, to prevent, particularly severe accidents. In this paper, a tool chain is introduced that enables fully automated traffic situation detection in wide-area traffic on the ...
Distributed Denial of Service attacks are becoming very popular nowadays. The easy access to services and resources that can be used for this purpose, and the high resulting amount of damage, are the main reasons for this. Current detection and mitigation systems are not accurate enough and can be very expensive. Previous research has led to detection methods that even though can be accurate fo...
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic characterization with behavior modeling could be a good guidance of attack detection. Aggregated traffic has been found to be s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید