Results 61 to 70 of about 2,296,766 (196)

High-density network flow monitoring [PDF]

open access: yes2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015
Monitoring of high-speed networks is becoming a resource intensive task. There are dedicated flow monitoring probes built with commodity hardware support up to 10G links, but multiple 10G or even 100 G optical networks are being used for transport networks and a data center connectivity.
Velan Petr, Puš Viktor
openaire   +2 more sources

A Unitary Weights Based One-Iteration Quantum Perceptron Algorithm for Non-Ideal Training Sets

open access: yesIEEE Access, 2019
In order to solve the problem of non-ideal training sets (i.e., the less-complete or over-complete sets) and implement one-iteration learning, a novel efficient quantum perceptron algorithm based on unitary weights is proposed, where the singular value ...
Wenjie Liu   +4 more
doaj   +1 more source

Habitat monitoring with sensor networks [PDF]

open access: yesCommunications of the ACM, 2004
These networks deliver to ecologists data on localized environmental conditions at the scale of individual organisms to help settle large-scale land-use issues affecting animals, plants, and people.
Szewczyk, Robert   +5 more
openaire   +2 more sources

An Efficient Scheme for Aggregation and Presentation of Network Performance in Distributed Brokering Systems [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2003
The Internet is presently being used to support increasingly complex interaction models as a result of more and more applications, services and frameworks becoming network centric.
Gurhan Gunduz   +2 more
doaj  

Secret Image Sharing Based on Encrypted Pixels

open access: yesIEEE Access, 2018
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou   +3 more
doaj   +1 more source

A Simple Monitoring Network System of Wireless Sensor Network [PDF]

open access: yes, 2012
A SSNS (simple sensor network sniffer) is used to analyze and evaluate the Wireless Sensor Networks (WSN) effectively. SSNS is designed to monitor IEEE 802.15.4 protocol frame, which based on the Ethernet. Unlike the existed monitoring system, our design
Su, S. (Shengjun), Wang, S. (Shuozhong)
core  

Reconfigurable monitoring for telecommunication networks

open access: yesPeerJ Computer Science, 2020
This article addresses the monitoring problem of the telecommunication networks. We consider these networks as multilevel dynamic objects. It shows that reconfigurable systems are necessary for their monitoring process in real life. We implement the reconfiguration abilities of the systems through the synthesis of monitoring programs and their ...
Man Tianxing   +6 more
openaire   +3 more sources

Adaptive sampling method for network traffic security monitoring based on queuing theory [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
Present network monitoring systems need to cope with the ever-increasing amount of traffic in modern high-speed networks. These systems often perform sophisticated deep packet inspection (DPI) for anomaly detection, denial-of-service attacks detection ...
Maciej Sosnowski, Piotr Wiśniewski
doaj   +1 more source

The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

open access: yesIEEE Access
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz   +7 more
doaj   +1 more source

Detecting Top-k Flows Combining Probabilistic Sketch and Sliding Window

open access: yesIEEE Access
Efficient real-time top-k flows measurement plays a pivotal role in enhancing both network performance and security, including tasks such as timely traffic scheduling, optimizing network latency and identifying potential security threats.
Keke Zheng   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy