[PDF][PDF] On the building blocks of quality of service in heterogeneous IP networks
J Soldatos, E Vayias, G Kormentzas - IEEE Communications Surveys …, 2005 - academia.edu
After more than a decade of active research on Quality of Service in IP networks and the
Internet, the majority of IP traffic relies on the conventional best-effort IP service model …
Internet, the majority of IP traffic relies on the conventional best-effort IP service model …
Detection of economic denial of sustainability (EDoS) threats in self-organizing networks
This paper reviews the threat of economic denial of sustainability on recent communication
networks and discusses their adaptation to emergent scenarios suited for self-organization …
networks and discusses their adaptation to emergent scenarios suited for self-organization …
[KNJIGA][B] Performance evaluation of computer and communication systems
JY Le Boudec - 2010 - api.taylorfrancis.com
Performance evaluation is often the critical part of evaluating the results of a research
project. Many of us are familiar with simulations, but it is frequently difficult to address …
project. Many of us are familiar with simulations, but it is frequently difficult to address …
Trident: A universal framework for fine-grained and class-incremental unknown traffic detection
To detect unknown attack traffic, anomaly-based network intrusion detection systems
(NIDSs) are widely used in Internet infrastructure. However, the security communities realize …
(NIDSs) are widely used in Internet infrastructure. However, the security communities realize …
Self-configuring network traffic generation
The ability to generate repeatable, realistic network traffic is critical in both simulation and
testbed environments. Traffic generation capabilities to date have been limited to either …
testbed environments. Traffic generation capabilities to date have been limited to either …
Network traffic classification using k-means clustering
Y Liu, W Li, Y Li - Second international multi-symposiums on …, 2007 - ieeexplore.ieee.org
Network traffic classification and application identification provide important benefits for IP
network engineering, management and control and other key domains. Current popular …
network engineering, management and control and other key domains. Current popular …
GNN-based hierarchical deep reinforcement learning for NFV-oriented online resource orchestration in elastic optical DCIs
Network function virtualization (NFV) in elastic optical datacenter interconnections (EO-
DCIs) enables flexible and timely deployment of network services. However, as the service …
DCIs) enables flexible and timely deployment of network services. However, as the service …
Edge device identification based on federated learning and network traffic feature engineering
With the ubiquitous deployment and applications of Internet of Things (IoT), security issues
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …
Harpoon: a flow-level traffic generator for router and network tests
We describe Harpoon, a new application-independent tool for generating representative
packet traffic at the IP flow level. Harpoon is a configurable tool for creating TCP and UDP …
packet traffic at the IP flow level. Harpoon is a configurable tool for creating TCP and UDP …
[KNJIGA][B] Large deviations for Gaussian queues: modelling communication networks
M Mandjes - 2007 - books.google.com
In recent years the significance of Gaussian processes to communication networks has
grown considerably. The inherent flexibility of the Gaussian traffic model enables the …
grown considerably. The inherent flexibility of the Gaussian traffic model enables the …