The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only...
In practical radio transmissions, channel capture is a dominating factor that affects wireless network performance. The capture effect can occur in wireless network when packets arrive with different powers. Packets with high power can effectively swamp low power packets, such that they are received successfully, when otherwise a collision would have occurred. We present a vehicular network performance-prediction...
CCN (Content Centric Networking) is a new network architecture, which is optimized for content distribution by introducing route cache and request aggregation. However, current CCN is still similar to traditional Client/Server network architecture, with limited cache space, and the request aggregation policy is suitable for live streaming media rather than streaming media on demand. The main reason...
This paper presents mechanisms for identification of web traffic masqueraded behind encrypted Virtual Private Network (VPN) tunnels. Website identification using Traffic Analysis (TA) has many administrative applications including preventing access to forbidden websites and site-specific Quality of Service (QoS) provisioning. Previous works in this area mainly looked at the problem of identifying...
Internet of Things (IoT) is an inter-network to which innumerable smart devices are connected, and eventually integrate the objective world with the information world. IoT is able to greatly improve the efficiency of productive process and promote the harmony between man-made and natural environments. Due to the variability and complexity of the future wireless network environment and the scarcity...
In this paper, the design and implementation of a video surveillance system based on 3G wireless mobile Internet access is proposed. The realization of both wired Ethernet and the wireless 3G accesses of Internet are implemented. A database in the video control server to automatically store the selected frames of the video stream data is implemented. A high-speed video monitoring sub-system using...
Trust has been one of the main factors affecting electronic commerce. Web of Trust (WOT) is a certification system that allows your identity to be validated for use in your personal certificate. On the basis of introducing the concept of WOT, a trust evaluation model is proposed to assist the individuals to establish ldquoWeb of Trustrdquo in online trust domain. This model uses FOAF and can be used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.