87,582 Hits in 8.0 sec

Traffic itself is simple-just analyzing it is not

R. Schleiffer
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences  
Traffic itself is simple -just analyzing it is not.  ...  If the above hypotheses is correct as it will be discussed in this paper it is much more easy to produce traffic in our computer terrarium by generating artificial agents that request mobility in TrafficLand  ...  It should be admitted that the examples described are very simple in the meaning that the observed group behavior does not adequately give a picture of real traffic situations.  ... 
doi:10.1109/hicss.2000.926671 dblp:conf/hicss/Schleiffer00 fatcat:jan6m525mvbzpldvfamdkyubsu

Effective traffic measurement using ntop

L. Deri, S. Suin
2000 IEEE Communications Magazine  
It is possible to identify machines that use nonoptimal routing just by keeping track of ICMP Redirect messages or periodically analyzing the list of subnet routers. • Traffic characterization and distribution  ...  Before analyzing the scenarios where ntop is used, it is worth having an overview of the application internals, its components, and its interactions.  ... 
doi:10.1109/35.841838 fatcat:zphzskbv3jeydpbmtdubrm3um4

Using Extended Raster File for Real Time Traffic Information Mining [chapter]

Michal Radecký, Jan Martinovič, Dušan Fedorčák, Radek Tomis, Ivo Vondrák
2012 Lecture Notes in Computer Science  
Gauging and analyzing the ever-growing strain on todays roadways is an issue that needs to be adressed with urgency.  ...  When processing data gathered from monitored vehicles, it is necessary to implement procedures that identify specific roadways upon which a given vehicles movement is recorded.  ...  Raster Indexing Spacial Data The principle of raster indexing, in and of itself, is quite simple. In several aspects, it is very similar to bitmap index.  ... 
doi:10.1007/978-3-642-33260-9_36 fatcat:whmr265cq5fylbndbsd3j32wxy

Page 31 of Institute of Transportation Engineers. ITE Journal Vol. 30, Issue 7 [page]

1960 Institute of Transportation Engineers. ITE Journal  
Whether this phenemenon is due to a lack of attention by the police or just the inability to write citations at these locations is not known.  ...  Information as to the enforcement time can be a useful refinement in citation analysis but it is not abso- lutely essential.  ... 

SCADA Vulnerabilities and Existing Security Approaches Towards Industrial Protection

However, due to the lack of SCADA network traffic data, such IDS solutions are still primitive and based on just well-known vulnerabilities and attacks, where a dedicated IDS is necessary to properly protect  ...  It is true that there are also many different security solutions and techniques available, such as firewalls, encryption, network traffic analysis and a few others, though, intruders still managed to gain  ...  The solution, however, uses a virtual representation of the real system, being in constant contact with it and updating its virtual database, not just based on the network traffic, but also from the real  ... 
doi:10.35940/ijitee.j7634.0991120 fatcat:uyyzijhezneq5ihcpuf2s7ygge

Page 31 of Institute of Transportation Engineers. ITE Journal Vol. 30, Issue 7 [page]

1960 Institute of Transportation Engineers. ITE Journal  
Whether this phenemenon is due to a lack of attention by the police or just the inability to write citations at these locations is not known.  ...  Information as to the enforcement time can be a useful refinement in citation analysis but it is not abso- lutely essential.  ... 


Jose M. Gonzalez, Vern Paxson, Nicholas Weaver
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
The primary innovation of Shunting is the introduction of a simple in-line hardware element that caches rules for IP addresses and connection 5-tuples, as well as fixed rules for IP/TCP flags.  ...  Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise.  ...  It is up to the analyzer or its associated policy script to either mark the analyzer as unessential (so that it may still receive traffic) or simply remove it from consideration.  ... 
doi:10.1145/1315245.1315264 dblp:conf/ccs/GonzalezPW07 fatcat:yqwkb5aknralthueyyxaly2eqa

Honeypot-powered Malware Reverse Engineering [article]

Michele Bombardieri, Salvatore Castanò, Fabrizio Curcio, Angelo Furfaro, Helen D. Karatza
2016 arXiv   pre-print
The research presented in this paper shows how high interaction honeypots can be enhanced by powering them with specific features that improve the reverse engineering activities needed to effectively analyze  ...  Among them, high interaction honeypots are considered the most efficient because the attacker (whether automated or not) perceives realistic interactions with the target machine.  ...  With such a type of honeypots, it is hard to study malware propagation in details because emulating a service behavior is not a simple task and most of these fake services offer only a, somewhat limited  ... 
arXiv:1510.03892v3 fatcat:dvpdpmvhebew3eayyhexvcdqhu

Comparing traffic flow models with different number of "phases"

P. Wagner, K. Nagel
2008 European Physical Journal B : Condensed Matter Physics  
(Examples are: the order parameter which is linked to any first-order phase transition is not identified at all, its behaviour at the phase transition is not discussed or analyzed, and so on.)  ...  The different models itself will be described in this text from the perspective of microscopic traffic flow (car-following) models, and we rely on the most simple of those models.  ... 
doi:10.1140/epjb/e2008-00078-0 fatcat:ivaub4pqvbcx5iivrqypa3xs7e

Comparing Background Subtraction Algorithms and Method of Car Counting [article]

Gautam S. Thakur, Mohsen Ali, Pan Hui, Ahmed Helmy
2012 arXiv   pre-print
We have given a sample of thousand images, which are the snap shots of current traffic as records at various intersections and highways.  ...  In the environment and applications greatly where simple object detection is not possible (because object could not be modeled due to variations) or is too expansive, background-subtraction methods are  ...  Any object or part of image that does not follow that model is characterized as "foreground". These "foreground" regions are then further processed to analyze if they represent desired object or not.  ... 
arXiv:1202.0549v1 fatcat:7d46qdyuwvgfzjbku5lgb34nsq

GTS Scheduling Scheme for Real-Time Communication in IEEE802.15.4 Industrial Wireless Sensor Networks

H Safdarkhani, S. A. Motamedi
2016 Indian Journal of Science and Technology  
In this paper considering the industrial network data types new GTS scheduling scheme for IEEE802.15.4 is introduced for the delay sensitive networks with bulk periodic data traffic.  ...  Methods/Statistical Analysis: Considering and studying the industrial network traffic model, a new adaptive centralized GTS scheduling algorithm is proposed focusing on real-time communication and reliability  ...  It will not make any problem in our analysis because it is possible that the source of 2or more traffic be just one node in practice.  ... 
doi:10.17485/ijst/2016/v9i7/87734 fatcat:xqwrs2mmy5guzcjdfn3ogzjpoi

Analysis of Signal Propagation in Vehicular Communications with RFID Tags

2020 International Journal of Emerging Trends in Engineering Research  
to the masses for further use of remote monitoring and traffic management.  ...  Radio-frequency identification (RFID) is a commonly used technology used in various applications such as inventory readers, body counters, marathon race tagging, and the like.  ...  system itself.  ... 
doi:10.30534/ijeter/2020/98892020 fatcat:ehjhzv76drhzxk373klbqaxvuq

TCP's role in the propagation of self-similarity in the Internet

A. Veres, Zs. Kenesi, S. Molnár, G. Vattay
2003 Computer Communications  
Through simple examples, it is shown that self-similarity of one TCP stream can be passed on to other TCP streams that it is multiplexed with.  ...  It is demonstrated that if a TCP connection shares a bottleneck link with a self-similar background traffic flow, it propagates the correlation structure of the background traffic flow asymptotically,  ...  In certain cases, spreading to an indirect stream does not happen at all, just like in the simple analytic example assuming ideal TCP flows and max-min fairness.  ... 
doi:10.1016/s0140-3664(02)00222-0 fatcat:535qmstz7zdrle3sfcygnqsq7m

Mapping a Pipelined Data Path onto a Network-on-Chip

Stephan Kubisch, Claas Cornelius, Ronald Hecht, Dirk Timmermann
2007 2007 International Symposium on Industrial Embedded Systems  
A simple NoC was developed, which knowingly omits sophisticated QoS mechanisms.  ...  This is done in the light of preliminary investigations for the redesign of an existing packet processing system because that system's current architecture exhibits drawbacks regarding performance and  ...  However, while we are just now and here debating the "Look and Feel" of the wires and routers instead of concentrating on the application itself and as it is also done in many other studies, there is no  ... 
doi:10.1109/sies.2007.4297333 dblp:conf/sies/KubischCHT07 fatcat:mjezkhue35dcfftlzmro6pq5pm

Network Traffic Anomalies Detection and Identification with Flow Monitoring [article]

Huy Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi
2010 arXiv   pre-print
And the result of the experiments proves that by using the four simple metrics from the flow data, we do not only effectively detect but can also identify the network traffic anomalies.  ...  In this paper, we propose a simple, robust method that detects network anomalous traffic data based on flow monitoring.  ...  Although the method we use here is very simple, it gives good performance and detecting result.  ... 
arXiv:1007.1264v1 fatcat:a2evyc3kvvgqjgbjrniurymsha
« Previous Showing results 1 — 15 out of 87,582 results