نتایج جستجو برای: packet length

تعداد نتایج: 347989  

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

Bita Alipasandi Neda Alipasandi Shahram Jamali,

Active Queue Management (AQM) plays an important role in the Internet congestion control. It tries to enhance congestion control, and to achieve tradeoff between bottleneck utilization and delay. Random Early Detection (RED) is the most popular active queue management algorithm that has been implemented in the in Internet routers and is trying to supply low delay and low packet loss. RED al...

Journal: :journal of advances in computer research 2013
shahram jamali bita alipasandi neda alipasandi

active queue management (aqm) plays an important role in the internet congestion control. it tries to enhance congestion control, and to achieve tradeoff between bottleneck utilization and delay. random early detection (red) is the most popular active queue management algorithm that has been implemented in the in internet routers and is trying to supply low delay and low packet loss. red algori...

Bita Alipasandi Neda Alipasandi Shahram Jamali,

Active Queue Management (AQM) plays an important role in the Internet congestion control. It tries to enhance congestion control, and to achieve tradeoff between bottleneck utilization and delay. Random Early Detection (RED) is the most popular active queue management algorithm that has been implemented in the in Internet routers and is trying to supply low delay and low packet loss. RED al...

Journal: :Electronics 2023

This paper proposes a joint optimization mechanism for packet length and power in the scenario of covert short D2D communication, so as to effectively improve communication performance between pairs subject constraint. Specifically, we construct short-packet model assisted by further propose notion effective throughput (ECT) quantitatively characterize trade-off covertness reliability IoT state...

Journal: :International journal of Computer Networks & Communications 2019

Journal: :ACM SIGMETRICS Performance Evaluation Review 2001

Journal: :JNW 2014
Lihua Zhang Guangjie Liu Yuewei Dai

Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed. The proposed scheme is based on the empirical distribution function of packet length series of legitimate traffic. Different from the existing schemes, the lengths of packets which are generated by the co...

Journal: :RFC 2014
Jörg Ott Varun Singh Igor D. D. Curcio

The RTP Control Protocol (RTCP) is used in conjunction with the Realtime Transport Protocol (RTP) in order to provide a variety of shortterm and long-term reception statistics. The available reporting may include aggregate information across longer periods of time as well as individual packet reporting. This document specifies a per-packet report metric capturing individual packets discarded fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید