Results 221 to 230 of about 84,174 (266)
Some of the next articles are maybe not open access.

Profiling and identifying users' activities with network traffic analysis

2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2015
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors.
Ma Tao, Ye Chun Ming, Chen Juan
openaire   +1 more source

Application Traffic Activity Graph Analysis

2011
Understanding and analyzing traffic characteristics are fundamental to the design, development and implementation of networks. The traditional emphasis of network traffic analysis has been on the statistical properties of traffic, leading to the important discoveries such as heavy-tails and long range dependence.
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
openaire   +1 more source

Performance Analysis of RACH Procedure with Beta Traffic-Activated Machine-Type-Communication

2015 IEEE Global Communications Conference (GLOBECOM), 2014
Machine-Type-Communication (MTC) is a keyenabler for a variety of novel smart systems, such as smartgrid, eHealth, Intelligent Transport System (ITS), and smart city,opening the area of the cyber physical systems. These systems mayrequire the use of a huge number of MTC devices, which will puta great pressure on the whole network, i.e.
Arouk, Osama   +3 more
openaire   +3 more sources

Analysis of Special Activity Airspace for Air Traffic Management

12th AIAA Aviation Technology, Integration, and Operations (ATIO) Conference and 14th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference, 2012
In today’s system, air traffic management decisions are often made in the absence of realtime special activity airspace (SAA) status information. Hence, planned routes for flights often avoid the SAA when, in fact, the SAA is inactive at the time the flight is projected to cross the SAA.
Poornima Balakrishna, George Hunter
openaire   +1 more source

BotMAD: Botnet malicious activity detector based on DNS traffic analysis

2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names.
Pooja Sharma   +2 more
openaire   +1 more source

GMAD: Graph-based Malware Activity Detection by DNS traffic analysis

Computer Communications, 2014
Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System ...
Jehyun Lee, Heejo Lee
openaire   +1 more source

Driver Behavior Analysis During ACC Activation and Deactivation in a Real Traffic Environment

IEEE Transactions on Intelligent Transportation Systems, 2010
For the development of a traffic-simulation model to estimate the effect of adaptive cruise control (ACC) systems on traffic safety, throughput, and environment, data of a field operational test (FOT) were analyzed, in which vehicles were equipped with ACC and lane-departure warning (LDW) systems.
Pauwelussen, J., Feenstra, P.J.
openaire   +2 more sources

Design and analysis of multi-level active queue management mechanisms for emergency traffic

Computer Communications, 2005
Multiple average-multiple threshold (MAMT) active queue management (AQM) is proposed as a solution for providing available and dependable service to traffic from emergency users after disasters. MAMT is a simple but effective approach that can be applied at strategic network locations, where heavy congestion is anticipated.
Manali Joshi   +3 more
openaire   +1 more source

Simulation and Analysis of Large-Scale Activity Traffic Flow in Urban Road Networks

CICTP 2016, 2016
Large scale activity is an important source of urban road network traffic congestion. In this paper, a cellular automaton model is proposed to simulate large scale activity traffic flow in urban two-way-four-lane network systems without signal control at intersections.
Junqing Shi, Sulan Li, Zhiqiang Li
openaire   +1 more source

A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning

2015
Analyzing network activity as it occurs is an important task since it allows for the prevention of malicious activity on the host system and the network. In this work, we investigate the performance of different budgeting strategies, as well as an adaptive Artificial Neural Network to analyze the activities on streaming network traffic.
Jillian Morgan   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy