Networked control under random and malicious packet losses

A Cetinkaya, H Ishii, T Hayakawa - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We study cyber security issues in networked control of a linear dynamical system.
Specifically, the dynamical system and the controller are assumed to be connected through …

Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows

R Bruno, M Conti, E Gregori - IEEE Transactions on Mobile …, 2007 - ieeexplore.ieee.org
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control
(MAC) protocol. However, very little has been done on investigating the interplay between …

[หนังสือ][B] AIMD dynamics and distributed resource allocation

Looking back, as we put the finishing touches to this book, it is hard to believe just how
fortunate we have been to complete a project of this type. We were incredibly lucky to have …

Reliable detection of interest flooding attack in real deployment of named data networking

T Nguyen, HL Mai, R Cogranne… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Named data networking (NDN) is a disruptive yet promising architecture for the future
Internet, in which the content diffusion mechanisms are shifted from the conventional host …

Detection of interest flooding attacks in named data networking using hypothesis testing

TN Nguyen, R Cogranne, G Doyen… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
With the rapid growth of Internet traffic, new emerging network architectures are under
deployment. Those architectures will substitute the current IP/TCP network only if they can …

Constructing stochastic model of TCP throughput on basis of stationarity analysis

H Yoshida, K Satoda, T Murase - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
End-to-end TCP throughput on best-effort networks fluctuates widely depending on cross
traffic and radio interference, which degrades the quality of public cloud services. However …

A machine learning approach for packet loss prediction in science flows

A Giannakou, D Dwivedi, S Peisert - Future Generation Computer Systems, 2020 - Elsevier
Science networks and their hosted applications require large and frequent data transfers,
but these transfers are subject to network performance degradation, including queuing …

Event-triggered control over unreliable networks subject to jamming attacks

A Cetinkaya, H Ishii, T Hayakawa - 2015 54th IEEE Conference …, 2015 - ieeexplore.ieee.org
Event-triggered networked control of a linear dynamical system is investigated. Specifically,
the dynamical system and the controller are assumed to be connected through a …

Cross-layer interaction of TCP and ad hoc routing protocols in multihop IEEE 802.11 networks

K Nahm, A Helmy, CCJ Kuo - IEEE transactions on mobile …, 2008 - ieeexplore.ieee.org
In this research, we first investigate the cross-layer interaction between TCP and routing
protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond …

Taxonomy and evaluation of TCP-friendly congestion-control schemes on fairness, aggressiveness, and responsiveness

SC Tsao, YC Lai, YD Lin - Ieee Network, 2007 - ieeexplore.ieee.org
Many TCP-friendly congestion control schemes have been proposed to pursue the TCP-
equivalence criterion, which states that a TCP-equivalent flow should have the same …