Sciweavers

7544 search results - page 127 / 1509
» Network Forensics Analysis
Sort
View
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 9 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White
AINA
2007
IEEE
15 years 9 months ago
Experimental analysis of peer-to-peer streaming in cellular networks
In this paper, we study the adequacy of applying peer-topeer techniques to mobile networks by conducting a series of experiments using smart phones as peers. We measure important ...
Almudena Diaz-Zayas, Pedro Merino, Laura Panizo, A...
110
Voted
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Modeling and Performance Analysis of Initial Connection in IEEE 802.16 PMP Networks
In this paper, we propose an accurate analytical model to analyze the performance of initial ranging requests in IEEE 802.16 networks. Two metrics, connection probability and aver...
Lidong Lin, Bo Han, Weijia Jia
119
Voted
CMSB
2006
Springer
15 years 7 months ago
Incorporating Time Delays into the Logical Analysis of Gene Regulatory Networks
Based on the logical description of gene regulatory networks developed by R. Thomas, we introduce an enhanced modelling approach that uses timed automata. It yields a refined quali...
Heike Siebert, Alexander Bockmayr
122
Voted
DMIN
2006
113views Data Mining» more  DMIN 2006»
15 years 4 months ago
Performance Evaluation of Two Data Mining Techniques of Network Alarms Analysis
In large telecommunication networks, alarms are usually useful for identifying faults and, therefore solving them. However, for large systems the number of alarms produced is so la...
Jacques-H. Bellec, M. Tahar Kechadi, Joe Carthy