Results 301 to 310 of about 6,499,676 (377)
Some of the next articles are maybe not open access.

Network Packet Forensics

, 2010
Eddie Schwartz is Chief Security Officer for NetWitness, the world leader in advanced threat intelligence and network forensics. He has 25 years of experience as an information security and privacy expert, specializing in the financial services and federal government sectors.
Eddie Schwartz
semanticscholar   +3 more sources

Networks with cognitive packets [PDF]

open access: possibleProceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728), 2002
Based on our earlier work ("Towards networks with intelligent packets", Proc. 14th Int. Symp. on Computer and Information Sciences, p. 1-11, Oct. 1999), we discuss packet networks in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols.
Zhiguang Xu, Erol Gelenbe, Ricardo Lent
openaire   +1 more source

SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks

IEEE International Conference on Network Protocols, 2019
In datacenter networks, flows need to complete as quickly as possible because the flow completion time (FCT) directly impacts user experience, and thus revenue.
Ting Qu   +5 more
semanticscholar   +1 more source

Packet Flow on Telecommunication Networks

SIAM Journal on Mathematical Analysis, 2006
The aim of this paper is to introduce a macroscopic fluid dynamic model dealing with the flow of information on a telecommunication network encoded in packets. Taking an intermediate time and space scale, we propose a model similar to that introduced recently for car traffic; see [G. M. Coclite, M. Garavello, and B. Piccoli, SIAM J. Math.
D'APICE, Ciro   +2 more
openaire   +4 more sources

Cognitive packet networks

Proceedings 11th International Conference on Tools with Artificial Intelligence, 2003
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire   +2 more sources

Packet Switched Networks [PDF]

open access: possible1983 IEEE Symposium on Security and Privacy, 1983
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire   +1 more source

Packet Sniffers and Network Monitors

Information Systems Security, 2000
Abstract Communications take place in forms that range from simple voice conversations to complicated manipulations of light. Each type of communication is based on two basic principles: wave theory and particle theory. In essence, communication can be established by the use of either, frequently in concert with a carrier or medium to provide ...
James S. Tiller, Bryan D. Fish
openaire   +2 more sources

Home - About - Disclaimer - Privacy