Sciweavers

248 search results - page 18 / 50
» Characterizing a spam traffic
Sort
View
SIGMETRICS
2008
ACM
126views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Characterizing multiparty voice communication for multiplayer games
Over the last few years, the number of game players using voice communication to talk to each other while playing games has increased dramatically. In fact, many modern games and ...
Gabor Papp, Chris GauthierDickey
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
CCECE
2006
IEEE
15 years 3 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
PAM
2010
Springer
14 years 11 months ago
A First Look at Mobile Hand-Held Device Traffic
Abstract. Although mobile hand-held devices (MHDs) are ubiquitous today, little is know about how they are used--especially at home. In this paper, we cast a first look on mobile h...
Gregor Maier, Fabian Schneider, Anja Feldmann
JDCTA
2010
163views more  JDCTA 2010»
14 years 4 months ago
An Approach to Traffic Volume Forecasting Based on Ant Colony Neural Network
Combining the ant colony algorithm (ACA) and the neural network (NN), the present paper puts forward an approach to traffic volume forecasting based on the ant colony neural netwo...
Hong Chen