Results 11 to 20 of about 6,332,366 (301)

Toward Packet Routing With Fully Distributed Multiagent Deep Reinforcement Learning

open access: yesIEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022
Packet routing is one of the fundamental problems in computer networks in which a router determines the next-hop of each packet in the queue to get it as quickly as possible to its destination.
Xinyu You   +5 more
semanticscholar   +1 more source

Delay-based network coding packet selection [PDF]

open access: yesManagement Science Letters, 2014
Network coding is introduced as a technique to improve performance in communication networks. In network coding, intermediate nodes mix packets to enhance network performance. To increase throughput, several approaches have been proposed based on network
Rasoul Nikoee Saravani   +1 more
doaj   +1 more source

Deep packet: a novel approach for encrypted traffic classification using deep learning [PDF]

open access: yesSoft Computing - A Fusion of Foundations, Methodologies and Applications, 2017
Network traffic classification has become more important with the rapid growth of Internet and online applications. Numerous studies have been done on this topic which have led to many different approaches.
M. Lotfollahi   +3 more
semanticscholar   +1 more source

Fast Parallel Network Packet Filter System based on CUDA [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation ...
Che-Lun Hung, Shih-Wei Guo
doaj   +1 more source

IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN

open access: yesSensors, 2022
With the large-scale application of the Internet of Things (IoT), security issues have become increasingly prominent. Device identification is an effective way to secure IoT environment by quickly identifying the category or model of devices in the ...
Xiangyu Liu, Yi Han, Yanhui Du
doaj   +1 more source

Intrusion Recognition for LTE Core Network Based on Low-Complexity Random Packet Detection [PDF]

open access: yesJisuanji gongcheng, 2020
In Long Term Evolution(LTE) core network,message detection is used in Policy Control and Charging(PCC) system to detect packets passing through the packet data network gateway, which reduces the security threat brought by malicious users.For this reason ...
LIU Yali, SHI Ruifeng, REN Xiaoliang
doaj   +1 more source

Network Coding for Severe Packet Reordering in Multihop Wireless Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Network coding is known to be effective in overcoming packet losses and packet reordering in multihop wireless networks. Despite the benefits, network coding is hard to deploy without being compatible with TCP.
Chansook Lim
doaj   +1 more source

Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation

open access: yes, 2017
Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficult to distinguish between DDoS and
I. Riadi, A. Muhammad, Sunardi
semanticscholar   +1 more source

E-model MOS Estimate Improvement through Jitter Buffer Packet Loss Modelling

open access: yesAdvances in Electrical and Electronic Engineering, 2011
Proposed article analyses dependence of MOS as a voice call quality (QoS) measure estimated through ITU-T E-model under real network conditions with jitter. In this paper, a method of jitter effect is proposed.
Adrian Kovac   +3 more
doaj   +1 more source

Defining Intent-Based Service Management Automation for 6G Multi-Stakeholders Scenarios

open access: yesIEEE Open Journal of the Communications Society
This article aims to explore the requirements and challenges that Intent-Based Management (IBM) systems should look towards to deliver proper automation management in multi-stakeholder 6G scenarios.
Pol Alemany   +21 more
doaj   +1 more source

Home - About - Disclaimer - Privacy