The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile applications have gained rising popularity due to the advantages in mobile technologies. Furthermore, the appearance of tablets and mobile devices with other forms has increased the diversity of apps. These phenomena have resulted in a growing need of app developers to understand usage behaviors of mobile apps. Previous studies in this area mostly rely on instrumented devices so that the scope...
The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so...
Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile...
In this paper, chaos theory is applied to study the traffic behavior of wireless sensor networks (WSN). Through reconstruction of phase space and calculation of maximum Lyapunov exponent, we find that WSN traffic is chaotic, and different topologies of WSN could cause a little variation on embedded dimensions and maximum Lyapunov exponents, but doesn't change chaotic characteristics of traffic in...
In this paper, nonlinear chaos theory and wavelet transform are applied in modeling and forecasting traffic of wireless sensor network (WSN). Wavelet-weighted local model of chaotic prediction not only takes the advantages of lower and more determinism in chaos theory, but also the advantages of unique multi-resolution analysis in wavelet transform, which can be used to generate a rich set of prediction...
Current increase in network bandwidth raised an aggressive challenge in network security, and stateful packet inspection based security systems is playing a more and more important role. Recent advances in scheduling theory show that it is possible to reduce the expected mean response time of a queuing system, simply by changing the order in which we schedule the requests according to the job size,...
Tremendous increases in spam traffic have made an imperative to develop effective techniques that can filter Internet spam traffic for using in network operation and security management. In this paper, we propose a more effective scheme called improved bulk mail traffic classification (IBMTC) for filtering spam from bulk delivery E-mails traffic. Based on our earlier designed scheme, we further address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.