A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Traffic itself is simple-just analyzing it is not
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
Traffic itself is simple -just analyzing it is not. ...
If the above hypotheses is correct as it will be discussed in this paper it is much more easy to produce traffic in our computer terrarium by generating artificial agents that request mobility in TrafficLand ...
It should be admitted that the examples described are very simple in the meaning that the observed group behavior does not adequately give a picture of real traffic situations. ...
doi:10.1109/hicss.2000.926671
dblp:conf/hicss/Schleiffer00
fatcat:jan6m525mvbzpldvfamdkyubsu
Effective traffic measurement using ntop
2000
IEEE Communications Magazine
It is possible to identify machines that use nonoptimal routing just by keeping track of ICMP Redirect messages or periodically analyzing the list of subnet routers. • Traffic characterization and distribution ...
Before analyzing the scenarios where ntop is used, it is worth having an overview of the application internals, its components, and its interactions. ...
doi:10.1109/35.841838
fatcat:zphzskbv3jeydpbmtdubrm3um4
Using Extended Raster File for Real Time Traffic Information Mining
[chapter]
2012
Lecture Notes in Computer Science
Gauging and analyzing the ever-growing strain on todays roadways is an issue that needs to be adressed with urgency. ...
When processing data gathered from monitored vehicles, it is necessary to implement procedures that identify specific roadways upon which a given vehicles movement is recorded. ...
Raster Indexing Spacial Data The principle of raster indexing, in and of itself, is quite simple. In several aspects, it is very similar to bitmap index. ...
doi:10.1007/978-3-642-33260-9_36
fatcat:whmr265cq5fylbndbsd3j32wxy
Page 31 of Institute of Transportation Engineers. ITE Journal Vol. 30, Issue 7
[page]
1960
Institute of Transportation Engineers. ITE Journal
Whether this phenemenon is due to a lack of attention by the police or just the inability to write citations at these locations is not known. ...
Information as to the enforcement time can be a useful refinement in citation analysis but it is not abso- lutely essential. ...
SCADA Vulnerabilities and Existing Security Approaches Towards Industrial Protection
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
However, due to the lack of SCADA network traffic data, such IDS solutions are still primitive and based on just well-known vulnerabilities and attacks, where a dedicated IDS is necessary to properly protect ...
It is true that there are also many different security solutions and techniques available, such as firewalls, encryption, network traffic analysis and a few others, though, intruders still managed to gain ...
The solution, however, uses a virtual representation of the real system, being in constant contact with it and updating its virtual database, not just based on the network traffic, but also from the real ...
doi:10.35940/ijitee.j7634.0991120
fatcat:uyyzijhezneq5ihcpuf2s7ygge
Page 31 of Institute of Transportation Engineers. ITE Journal Vol. 30, Issue 7
[page]
1960
Institute of Transportation Engineers. ITE Journal
Whether this phenemenon is due to a lack of attention by the police or just the inability to write citations at these locations is not known. ...
Information as to the enforcement time can be a useful refinement in citation analysis but it is not abso- lutely essential. ...
Shunting
2007
Proceedings of the 14th ACM conference on Computer and communications security - CCS '07
The primary innovation of Shunting is the introduction of a simple in-line hardware element that caches rules for IP addresses and connection 5-tuples, as well as fixed rules for IP/TCP flags. ...
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. ...
It is up to the analyzer or its associated policy script to either mark the analyzer as unessential (so that it may still receive traffic) or simply remove it from consideration. ...
doi:10.1145/1315245.1315264
dblp:conf/ccs/GonzalezPW07
fatcat:yqwkb5aknralthueyyxaly2eqa
Honeypot-powered Malware Reverse Engineering
[article]
2016
arXiv
pre-print
The research presented in this paper shows how high interaction honeypots can be enhanced by powering them with specific features that improve the reverse engineering activities needed to effectively analyze ...
Among them, high interaction honeypots are considered the most efficient because the attacker (whether automated or not) perceives realistic interactions with the target machine. ...
With such a type of honeypots, it is hard to study malware propagation in details because emulating a service behavior is not a simple task and most of these fake services offer only a, somewhat limited ...
arXiv:1510.03892v3
fatcat:dvpdpmvhebew3eayyhexvcdqhu
Comparing traffic flow models with different number of "phases"
2008
European Physical Journal B : Condensed Matter Physics
(Examples are: the order parameter which is linked to any first-order phase transition is not identified at all, its behaviour at the phase transition is not discussed or analyzed, and so on.) ...
The different models itself will be described in this text from the perspective of microscopic traffic flow (car-following) models, and we rely on the most simple of those models. ...
doi:10.1140/epjb/e2008-00078-0
fatcat:ivaub4pqvbcx5iivrqypa3xs7e
Comparing Background Subtraction Algorithms and Method of Car Counting
[article]
2012
arXiv
pre-print
We have given a sample of thousand images, which are the snap shots of current traffic as records at various intersections and highways. ...
In the environment and applications greatly where simple object detection is not possible (because object could not be modeled due to variations) or is too expansive, background-subtraction methods are ...
Any object or part of image that does not follow that model is characterized as "foreground". These "foreground" regions are then further processed to analyze if they represent desired object or not. ...
arXiv:1202.0549v1
fatcat:7d46qdyuwvgfzjbku5lgb34nsq
GTS Scheduling Scheme for Real-Time Communication in IEEE802.15.4 Industrial Wireless Sensor Networks
2016
Indian Journal of Science and Technology
In this paper considering the industrial network data types new GTS scheduling scheme for IEEE802.15.4 is introduced for the delay sensitive networks with bulk periodic data traffic. ...
Methods/Statistical Analysis: Considering and studying the industrial network traffic model, a new adaptive centralized GTS scheduling algorithm is proposed focusing on real-time communication and reliability ...
It will not make any problem in our analysis because it is possible that the source of 2or more traffic be just one node in practice. ...
doi:10.17485/ijst/2016/v9i7/87734
fatcat:xqwrs2mmy5guzcjdfn3ogzjpoi
Analysis of Signal Propagation in Vehicular Communications with RFID Tags
2020
International Journal of Emerging Trends in Engineering Research
to the masses for further use of remote monitoring and traffic management. ...
Radio-frequency identification (RFID) is a commonly used technology used in various applications such as inventory readers, body counters, marathon race tagging, and the like. ...
system itself. ...
doi:10.30534/ijeter/2020/98892020
fatcat:ehjhzv76drhzxk373klbqaxvuq
TCP's role in the propagation of self-similarity in the Internet
2003
Computer Communications
Through simple examples, it is shown that self-similarity of one TCP stream can be passed on to other TCP streams that it is multiplexed with. ...
It is demonstrated that if a TCP connection shares a bottleneck link with a self-similar background traffic flow, it propagates the correlation structure of the background traffic flow asymptotically, ...
In certain cases, spreading to an indirect stream does not happen at all, just like in the simple analytic example assuming ideal TCP flows and max-min fairness. ...
doi:10.1016/s0140-3664(02)00222-0
fatcat:535qmstz7zdrle3sfcygnqsq7m
Mapping a Pipelined Data Path onto a Network-on-Chip
2007
2007 International Symposium on Industrial Embedded Systems
A simple NoC was developed, which knowingly omits sophisticated QoS mechanisms. ...
This is done in the light of preliminary investigations for the redesign of an existing packet processing system because that system's current architecture exhibits drawbacks regarding performance and ...
However, while we are just now and here debating the "Look and Feel" of the wires and routers instead of concentrating on the application itself and as it is also done in many other studies, there is no ...
doi:10.1109/sies.2007.4297333
dblp:conf/sies/KubischCHT07
fatcat:mjezkhue35dcfftlzmro6pq5pm
Network Traffic Anomalies Detection and Identification with Flow Monitoring
[article]
2010
arXiv
pre-print
And the result of the experiments proves that by using the four simple metrics from the flow data, we do not only effectively detect but can also identify the network traffic anomalies. ...
In this paper, we propose a simple, robust method that detects network anomalous traffic data based on flow monitoring. ...
Although the method we use here is very simple, it gives good performance and detecting result. ...
arXiv:1007.1264v1
fatcat:a2evyc3kvvgqjgbjrniurymsha
« Previous
Showing results 1 — 15 out of 87,582 results