DDoS Attacks Detection using Machine Learning
MY Sabir - 2023 - dspace.library.uvic.ca
The advancement in information technology has created a new era named as Internet of
Things (IoT). This new technology has allowed things to be connected to the Internet, for …
Things (IoT). This new technology has allowed things to be connected to the Internet, for …
Modeling of the convergence time of an IP-based network with different traffic loads
I Nedyalkov, A Stefanov… - IEEE EUROCON 2019 …, 2019 - ieeexplore.ieee.org
In the present work a modeling of an IP-based corporate network with different traffic loads-
Internet browsing, video conferencing, working with databases and VoIP calls has been …
Internet browsing, video conferencing, working with databases and VoIP calls has been …
Packet reordering correction for low-latency network applications
T Beneš, S Ubik, J Halák - 2022 11th Mediterranean …, 2022 - ieeexplore.ieee.org
Packet reordering is common in the current Internet. We discuss options for correction of
packet reordering on the receiver side of RTP audiovisual streams transmitted on top of the …
packet reordering on the receiver side of RTP audiovisual streams transmitted on top of the …
Appropriate buffer sizes for Internet nodal devices: A networks' topologies–based solution
MO Eyinagho, SO Falaki - International Journal of …, 2020 - Wiley Online Library
Switched networks'(including the Internet) nodal devices require buffers to hold packets
during periods of congestion and when traffic streams on more than one input port need to …
during periods of congestion and when traffic streams on more than one input port need to …
Network based Learning Platform Application Model for Enhancement of Realtime Working Systems
RS Priya, S Shanmugavadivel… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Learning platforms have become an integral part of the education system these days.
Especially after the COVID era, education has become more allied with self-paced and …
Especially after the COVID era, education has become more allied with self-paced and …
Definition and Visualization of Protocols in Computer Networks
This paper addresses the issue of network protocol design, definition, and visualization. A
novel design tool for visualizing network protocols is introduced. Its implementation is …
novel design tool for visualizing network protocols is introduced. Its implementation is …
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls
W Koribeche, D Espes, C Morin - … on Foundations and Practice of Security, 2023 - Springer
Firewalls are essential components for security enforcement in a network, as they are the
first layer of protection from unwanted traffic and cyber-attacks. While the requirements for …
first layer of protection from unwanted traffic and cyber-attacks. While the requirements for …
[PDF][PDF] NS2–Based Experimental Analysis of Throughput for TCP and UDP Traffic During Link Failure of The Network
Link failure refers to the failure between two connections/nodes in a perfectly working
simulation scenario at a particular instance. Transport layer routing protocols form an …
simulation scenario at a particular instance. Transport layer routing protocols form an …
Identifying Packet Loss and Reordering Packets in Keyed UDP Transmissions
The User Datagram Protocol (UDP) and other similar protocols send application data from
the source to the destination machine inside segments, without foreseeing for any type of …
the source to the destination machine inside segments, without foreseeing for any type of …
Assessment of the Performance of a Special User Datagram Protocol: Identifying Packet Loss and Reordering Packets in Keyed UDP Transmissions
FG Machado - 2022 - search.proquest.com
Abstract O User Datagram Protocol (UDP) e outros protocolos semelhantes enviam dados
de aplicativos da máquina de origem para a máquina de destino dentro de datagramas ou …
de aplicativos da máquina de origem para a máquina de destino dentro de datagramas ou …