Sciweavers

34 search results - page 2 / 7
» Unwanted traffic in 3G networks
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
12 years 11 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
TMC
2010
137views more  TMC 2010»
12 years 11 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
GLOBECOM
2008
IEEE
13 years 4 months ago
Correlation Among Piecewise Unwanted Traffic Time Series
In this paper, we investigate temporal and spatial correlations of time series of unwanted traffic (i.e., darknet or network telescope traffic) in order to estimate statistical beh...
Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Tosh...
IJNSEC
2006
56views more  IJNSEC 2006»
13 years 4 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
ICDS
2007
IEEE
13 years 11 months ago
New Approach for Cellular Network Improvement
— In an attempt to optimize network performance of delivered 2G and 3G services and reduce operating costs, today's mobile operators are searching for aggregation and concen...
Stanislav Milanovic