Sciweavers

7587 search results - page 128 / 1518
» Network Analysis and Visualisation
Sort
View
ISI
2004
Springer
15 years 9 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...

Publication
168views
17 years 2 months ago
Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT
The performance of Fiber-Distributed Data Interface (FDDI) depends upon several workload parameters; for example; the arrival pattern, frame size, and configuration parameters, suc...
Raj Jain
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 10 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White
AINA
2007
IEEE
15 years 10 months ago
Experimental analysis of peer-to-peer streaming in cellular networks
In this paper, we study the adequacy of applying peer-topeer techniques to mobile networks by conducting a series of experiments using smart phones as peers. We measure important ...
Almudena Diaz-Zayas, Pedro Merino, Laura Panizo, A...
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Modeling and Performance Analysis of Initial Connection in IEEE 802.16 PMP Networks
In this paper, we propose an accurate analytical model to analyze the performance of initial ranging requests in IEEE 802.16 networks. Two metrics, connection probability and aver...
Lidong Lin, Bo Han, Weijia Jia