Results 91 to 100 of about 2,296,766 (196)
Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams
In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the ...
Ivan Nedyalkov
doaj +1 more source
The Repeated Prisoner’s Dilemma in a Network [PDF]
Imperfect private monitoring in an infinitely repeated discounted Prisoner’s Dilemma played on a communication network is studied. Players observe their direct neighbors’ behavior only, but communicate strategically the repeated game’s history throughout
Markus Kinateder
core
En aquest projecte es presenta una aplicació web que permet obtenir dades d’una xarxa, indicada per l’usuari, mitjançant escanejos amb el programa nmap. Amb les dades obtingudes, es genera un informe amb una estructura ordenada, que permet extreure conclusions de la xarxa escanejada.
openaire +1 more source
Geo-localized Network Data Analysis Using VIKOR: Application of Network Health Monitoring in Turkey
Middle-high level managers of operators of telecommunications have to follow many key parameters to increase the profitability along with strategy of company. Therefore, easily readable data are being provided to managers by experts.
Cihan Şahin
doaj +1 more source
The effect of temporal aggregation level in social network monitoring. [PDF]
Zhao MJ +5 more
europepmc +1 more source
Fuzzy Ontology and LSTM-Based Text Mining: A Transportation Network Monitoring System for Assisting Travel. [PDF]
Ali F, El-Sappagh S, Kwak D.
europepmc +1 more source
GNSS Spoofing Network Monitoring Based on Differential Pseudorange. [PDF]
Zhang Z, Zhan X.
europepmc +1 more source
GTSO: Global Trace Synchronization and Ordering Mechanism for Wireless Sensor Network Monitoring Platforms. [PDF]
Navia M, Campelo JC, Bonastre A, Ors R.
europepmc +1 more source
Approach to early detection and defense against internet worms
A distributed defense mechanism was proposed.The main task of defense mechanism was to quickly detect worm attacks and response to constrain their propagation.The defense mechanism was composed of two parts: a date processing centre(DPC) and distributed ...
CHEN Bo, FANG Bin-xing, YUN Xiao-chun
doaj
ABSTRACT: Network monitoring system plays a significant role in the network security and management. Network monitoring refers to the observation on the events, happening through the network with the aim of providing a secure and persistent network. However, many small and medium sized companies and organizations prefer to escape from this fact.
openaire +1 more source

