Results 11 to 20 of about 84,174 (266)
Network-traffic data usually arrives in the form of a data stream. Online monitoring systems need to handle the incoming samples sequentially and quickly. These systems regularly need to get access to ground-truth data to understand the current state of the application they are monitoring, as well as to adapt the monitoring application itself. However,
Wassermann, Sarah +2 more
openaire +2 more sources
This paper studies the important factor of sector-based time variable, which is critical to urban mobility patterns in an urban environment. In particular, this study analyzes urban traffic optimization based on modeling analysis of a simulated urban ...
Ali Cheshmehzangi +3 more
doaj +1 more source
New Type of UDP Reflection Amplification Protocol Recognition Method Based on Active-Passive Combination [PDF]
Reflection amplification attack has gradually become a mainstream DDoS attack method because of its high-quality traffic doubling ability and anti-traceability capability.In recent years,new UDP reflection amplification attack methods represented by ...
CHEN Hongwei, YIN Xiaokang, GAI Xianzhe, JIA Fan, LIU Shengli, CAI Ruijie
doaj +1 more source
Thirty years of research on driving behavior active intervention: A bibliometric overview
To better understand the research focus and development direction in the field of driving behavior active intervention, thereby laying a scientific foundation for further research, we used the combination of topic words and keywords to retrieve relevant ...
Miaomiao Yang +3 more
doaj +1 more source
Heavy-Duty Vehicle Braking Stability Control and HIL Verification for Improving Traffic Safety
The braking failure of heavy vehicles under long downhill or curved conditions may cause traffic crash and reduce road traffic efficiency. Therefore, to improve the traffic safety and braking stability of vehicles under special road conditions, a braking
Fahui Wang, Yongjie Lu, Haoyu Li
doaj +1 more source
The risk of ship–bridge collisions should be evaluated using advanced models to consider different anti-collision and bridge-protection measures. This study aimed to propose a method to evaluate the effectiveness of active and passive safety measures in ...
Wenqing Ma +4 more
doaj +1 more source
Tackling Mobile Traffic Critical Path Analysis With Passive and Active Measurements [PDF]
Critical Path Analysis (CPA) studies the delivery of webpages to identify page resources, their interrelations, as well as their impact on the page loading latency. Despite CPA being a generic methodology, its mechanisms have been applied only to browsers and web traffic, but those do not directly apply to study generic mobile apps.
Gioacchino Tangari +4 more
openaire +1 more source
Permissible distance – safety system of vehicles in use
The article presents and assesses the shortcomings of the applicable provisions regarding the maintenance of the necessary distance behind the preceding vehicle in road traffic. We are exposed to accidents when using vehicles.
Olejnik Krzysztof
doaj +1 more source
Characterization of Attackers' Activities in Honeypot Traffic Using Principal Component Analysis [PDF]
Monitoring Internet traffic is critical in order to acquire a good understanding of threats and in designing efficient security systems. While honeypots are flexible security tools for gathering intelligence of Internet attacks, traffic collected by honeypots is of high dimensionality that makes it difficult to characterize.
Almotairi, Saleh +3 more
openaire +2 more sources
Modeling and Analysis of Active Queue Management Schemes under Bursty Traffic
Traffic congestion arising from the shared nature of uplink channels in wireless networks can cause serious problems for the provision of QoS to various services. One approach to overcome these problems is to implement some effective congestion control mechanisms at the downlink buffer at the mobile network link layer or at gateways on the behalf of ...
Wang, Lan, Min, Geyong, Awan, Irfan U.
openaire +2 more sources

