The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse the complex data patterns appearing therein as based on the pre-defined intrusion 'detection' rule sets. As IDS traces monitor large groups of servers, large amounts of network data and also spanning a variety of patterns, efficient analytical approaches are needed to address this big heterogeneous data...
We study an optimization problem to maximize the cloud gaming provider's total profit while achieving just-good-enough Quality-of-Experience (QoE). The optimization problem has exponential running time, and we develop an efficient heuristic algorithm. We also present an alternative formulation and algorithms for closed cloud gaming services, in which the profit is not a concern and overall gaming...
IP flow analysis is an effective way of doing network forensic analysis which aims to detect attack patterns and identify attackers in a given network traffic data. For attacks such as Distributed Denial of Service (DDoS), efficiently identifying the botnet in time can be a challenge. Recently, the unsupervised learning methods such as the K-means, self-organizing map (SOM), and growing hierarchical...
Voice and data communications on high speed vehicles encounter bad channel condition, high call drop rate, serious signaling congestion and excessive power consumption of UE. Mobile relay technology which features on-board relay node is expected to improve the quality of service for passengers. However, the design for fixed relay in LTE-Advanced system cannot meet the requirements of mobile relay...
Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications obscure their network behaviors. While port number-based classifiers work only for some well-known applications and signature-based classifiers are not applicable to encrypted packet payloads, researchers tend to classify network traffic...
Peer-to-peer networking is a popular topic for network researchers. A fundamental step before digging into understanding peer-to-peer network behavior is to collect a sufficient amount of peer-to-peer traffic traces. However, it is not really easy to obtain traces. Due to privacy concerns, researchers usually have to either sign non-disclosure agreements or choose to use anonymous/obfuscated traces,...
With the wide application of spatial information grid, how to solve the data synchronization has become a current research focus in spatial information grid. Because of the confidentiality and specificity of spatial data, it needs each grid node can only have their own data. When one grid node wants to use the data in another one, it must obey the principle of using the data without owning the data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.