نتایج جستجو برای: traffic phase detection
تعداد نتایج: 1223932 فیلتر نتایج به سال:
Recent years, the transportation efficiency and related issues have become one of the main focuses of the global world. Along this line, intelligent transportation systems (ITS) based on Internet of Things (IoT) has become a common solution to may transportation problems, such as traffic prediction, road status evaluation, traffic accident detection, etc. In this paper, we focus on the traffic ...
Currently, the primary concerns on Internet are security and privacy, particularly in encrypted communications to prevent snooping modification of Domain Name System (DNS) data by hackers who may attack using HTTP protocol gain illegal access information. DNS over HTTPS (DoH) is new that has made remarkable progress encrypting traffic modifying spying. To alleviate these challenges, this study ...
The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network intrusion detection and prevention system consist of collecting traffic data, analyzing them based on detection rules and generate alerts or dropping them if necessary. However IPS ...
The essence of this work is to introduce an interaction between the physical layer and higher network layers, thus enabling a more practical utilization of multiuser detection and supporting services with different QoS parameters. In this paper, a new hybrid TDMA/ Multicode (MC)-CDMA medium access control utilizing multiuser detection is proposed and analyzed. Further, two traffic flow control ...
We briefly review the advances in driver assistance systems and present a realtime version that integrates single view detection with region-based 3D tracking of traffic signs. The system has a typical pipeline: detection and recognition of traffic signs in independent frames, followed by tracking for temporal integration. The detection process finds an optimal set of candidates and is accelera...
Measurement and analysis of traffic in IP networks are of great interest for network operators as they provide important information about the utilization of network resources, the user behavior, as well as the deployed applications and services. In particular, flow-level traffic measurements have become more and more ubiquitous in the past years. In this context, a flow is defined as a stream ...
We present a generic framework to reason about constraint problems with incomplete or erroneous data. Such problems are often simplified at present to tractable deterministic models, or modified using error correction methods, with the aim of seeking a solution. However, this can lead us to solve the wrong problem because of the approximations made. Such an outcome is of little help to the user...
The botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic an...
Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are somemethods designed to handle the AL-DDoS attacks, but most of th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید