Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
Sensor nodes report the sensed data packets to the sink and depending on the application these packets may have diverse attributes: time-critical (TC) and non time-critical (NTC). ...
Md. Abdur Razzaque, Muhammad Mahbub Alam, Md. Mamu...
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
-- In this paper, we propose DATALITE, a Distributed Architecture for Traffic Analysis via LIghtweight Traffic digEst, which introduces a set of new distributed algorithms and prot...
Wing Cheong Lau, Murali S. Kodialam, T. V. Lakshma...