Results 301 to 310 of about 6,361,006 (369)
Some of the next articles are maybe not open access.

Exploiting integrated GPUs for network packet processing workloads

IEEE Conference on Network Softwarization, 2016
Software-based network packet processing on standard high volume servers promises better flexibility, manageability and scalability, thus gaining tremendous momentum in recent years.
Janet Tseng   +7 more
semanticscholar   +1 more source

Packet Flow on Telecommunication Networks

SIAM Journal on Mathematical Analysis, 2006
The aim of this paper is to introduce a macroscopic fluid dynamic model dealing with the flow of information on a telecommunication network encoded in packets. Taking an intermediate time and space scale, we propose a model similar to that introduced recently for car traffic; see [G. M. Coclite, M. Garavello, and B. Piccoli, SIAM J. Math.
D'APICE, Ciro   +2 more
openaire   +4 more sources

Network Packet Length Covert Channel Based on Empirical Distribution Function

J. Networks, 2014
Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed.
Lihua Zhang, Guangjie Liu, Yue-wei Dai
semanticscholar   +1 more source

SketchVisor: Robust Network Measurement for Software Packet Processing

Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2017
Network measurement remains a missing piece in today's software packet processing platforms. Sketches provide a promising building block for filling this void by monitoring every packet with fixed-size memory and bounded errors.
Qun Huang   +6 more
semanticscholar   +1 more source

Network packet payload parity based steganography

2013 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (CSUDET), 2013
Network steganography is an emerging research field, which exploits packet protocol headers, protocol mechanism, packet payload, etc. to establish secret communication between two parties over a computer network.
Osamah Ibrahiem Abdullaziz   +3 more
semanticscholar   +1 more source

Data-Based Predictive Control for Networked Nonlinear Systems With Network-Induced Delay and Packet Dropout

IEEE transactions on industrial electronics (1982. Print), 2016
This paper addresses the data-based networked control problem for a class of nonlinear systems. Network communication constraints, such as network-induced delay, packet disorder, and packet dropout in both the feedback and forward channels, are ...
Zhong-Hua Pang   +3 more
semanticscholar   +1 more source

Cognitive packet networks

Proceedings 11th International Conference on Tools with Artificial Intelligence, 2003
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire   +2 more sources

pcapIndex: an index for network packet traces with legacy compatibility

CCRV, 2012
Long-term historical analysis of captured network traffic is a topic of great interest in network monitoring and network security. A critical requirement is the support for fast discovery of packets that satisfy certain criteria within large-scale packet
F. Fusco   +3 more
semanticscholar   +1 more source

Packet tracing and analysis of network cameras with Wireshark

International Symposium on Digital Forensics and Security, 2017
Although people think that their identity is not revealed on the internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question.
Resul Das, Gurkan Tuna
semanticscholar   +1 more source

Packet Switched Networks [PDF]

open access: possible1983 IEEE Symposium on Security and Privacy, 1983
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire   +1 more source

Home - About - Disclaimer - Privacy