Filters








9 Hits in 2.5 sec

ITSA: Internet traffic statistics archive

Martijn Hoogesteger, Ricardo de O. Schmidt, Aiko Pras
2016 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium  
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA).  ...  Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes.  ...  In this demo we will present the ITSA (Internet Traffic Statistics Archive) system that we have developed to (1) collect flow-level traffic measurements (NetFlow-style) from multiple sources around the  ... 
doi:10.1109/noms.2016.7502940 dblp:conf/noms/HoogestegerSP16 fatcat:5zzgmlk74ndvrlkzngqjyj2obq

The Metropolitan Travel Survey Archive: A Case Study in Archiving [chapter]

David Levinson, Ewa Zofka
2006 Travel Survey Methods  
The paper concludes with some recommendations for archiving data.  ...  A case, applying these approaches to a US Metropolitan Travel Survey Archive is presented.  ...  A related solution for the archiving problems would be to create an International Travel Survey Archive Project (ITSA). The ITSA project would continue the MTSA idea on an international scale.  ... 
doi:10.1108/9780080464015-012 fatcat:vgzyhwq6c5cw5e5a4wck4ut5n4

Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

Aida Kamišalić, Renata Kramberger, Iztok Fister
2021 Applied Sciences  
They searched for bitcoin generator scams with multiple search engines: Google, Bitcoin.fr, CuteStat.com, and the Internet Archive. They included multiple classifiers for evaluation purposes.  ...  Data were first gathered from the Stratum traffic generator and analysed to identify the flows coming from mining traffic.  ... 
doi:10.3390/app11177987 fatcat:w54qaqlvobfdloqsyqj3lnloyu

Quality improvement of labels for model-driven benchmark data generation for intrusion detection systems

Maximilian Frank, Andreas Rauber
2021
various algorithms and techniques to detect malicious activities on systems or computer networks, are therefore commonly used by cyber security personnel to counteract intrusions.Datasets containing traffic  ...  IDS Types Each of the threed iscussed detectiont echniquesh as itsa dvantagesa nd disadvantages.  ...  connected component for which only ap artial labeling wasd one as it wasn ot possiblet od efinitivelyd ifferentiate between malicious and non-malicious traffic originatingf romt he Internet.  ... 
doi:10.34726/hss.2021.82646 fatcat:66k7w4f3xvdjblczx5ygl5bjve

Distributed Real Time Algorithms and Design Concepts for Next Generation Survivable Optical Networks

Emad AISukhni, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2013
Motivated by the rapid growth of the internet, the increasing demand and the nature of traffic, wavelength division multiplexing (WDM) is now beginning to expand from a network core technology towards  ...  We consider the networks without wavelength conversion capability as well as dynamic traffic environment.  ...  L'auteur a accorde une licence non exclusive permettant a la Bibliotheque et Archives Canada de reproduire, publier, archiver, sauvegarder, conserver, transmettre au public par telecommunication ou par  ... 
doi:10.20381/ruor-20059 fatcat:cl4dm3zifvguhcofuu3np4ukhq

The Practice, Challenges, and Prospects of e-Government: the Case of Ethiopian Revenue and Customs Authority (ERCA) Large Taxpayers Office (LTO)

Samuel Eshetu
2015
and only 1 TV program archive.  ...  Date of last update of each website was captured from both the website and the Internet Archives (http://web.archive.org/).  Website usability o Important links -a website providing links to relevant  ...  Are digital exchanges of information/data, electronic form of data, electronic transaction, electronic/digital signature, electronic archiving, etc. have legal recognition?  ... 
doi:10.20372/nadre/15938 fatcat:b6s45iprujcbxlo6vkdbywqe4m

Informatics for Health 2017: Advancing both science and practice

Philip J. Scott, Ronald Cornet, Colin McCowan, Niels Peek, Paolo Fraccaro, Nophar Geifman, Wouter T. Gude, William Hulme, Glen P. Martin, Richard Williams
2017 Journal of Innovation in Health Informatics  
In the past it was common for data to be archived when a study was finished.  ...  Results for accident and emergency attendances and admissions for road traffic accidents reported by the young people will also be presented.  ...  nurses' needs on the adoption of hospital Iot-based service Seung Jin Kang, Hyun Young Baek Eun Ja Jung, Hee Hwang and Sooyoung Yoo, Seoul National University Bundang Hospital, Seongnam-si Introduction Internet  ... 
doi:10.14236/jhi.v24i1.939 pmid:28665785 fatcat:fj7cg7o6h5c3hnd5x7b2cfo2te

How the European Union tackles future robotics

Mateusz Gren, Michael Lazarus, Michael Filzmoser, Jesse De Pagter
2021
Actually,t he internet infrastructure was first implementedb yg overnmentp rograms sucha st he primary example ARPANET.  ...  In addition,p assengersc oulde ngage with things other than traffic while driving.  ... 
doi:10.34726/hss.2021.70321 fatcat:ovtkjzotznhf5jqjf7eg37dpd4

An Agent Based Simulation of Geospatial Aspects of Street Crime in Maputo City

Philipp Schnatter, Thomas Grechenig
2021
GISisdeeplyintegrated in the internet and increasinglyt akinga dvantage of wireless networks and mobile devices.  ...  To day, the paramount network is the internet, connecting billions of people, personal computers,s ervers andother devices.  ... 
doi:10.34726/hss.2021.91200 fatcat:copwa4yccbbdtobt6cu3xpqqa4