Buscar
Mostrando ítems 11-20 de 20
Remote access protocols for Desktop-as-a-Service solutions
(Public Library of Science, 2019)
Artículo / Artikulua,
The use of remote desktop services on virtualized machines is a general trend to reduce the cost of desktop seats. Instead of assigning a physical machine with its operating system and software to each user, it is considerably ...
TBDClust: time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers
(Elsevier, 2017)
Artículo / Artikulua,
The World Wide Web has evolved rapidly, incorporating new content types and becoming more dynamic. The contents from a website can be distributed between several servers, and as a consequence, web traffic has become ...
Computation of traffic time series for large populations of IoT devices
(MDPI, 2018)
Artículo / Artikulua,
En este artículo se estudian las tecnicas para clasificar paquetes de tráfico de red en múltiples clases orientadas a la realización de series temporales de tráfico en escenarios de un elevado numero de clases como pueden ...
A passive traffic algorithm for detecting unavailable periods in TCP services
(IARIA, 2015)
Artículo / Artikulua,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...
Detecting disruption periods on TCP servers with passive packet traffic analysis
(IARIA, 2015)
Contribución a congreso / Biltzarrerako ekarpena,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...
A simple passive method to estimate RTT in high bandwidth-delay networks
(IARIA, 2015)
Contribución a congreso / Biltzarrerako ekarpena,
This paper presents a simple passive algorithm to
estimate the Round-Trip-Time (RTT) of a TCP connection in high
bandwidth-delay network scenarios. In these scenarios, a passive
RTT estimator that can be used on captured ...
High-speed analysis of SMB2 file sharing traffic without TCP stream reconstruction
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
This paper presents a file sharing traffic analysis methodology for Server Message Block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be ...
Effective analysis of secure web response time
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
The measurement of response time in web based applications is a common task for the evaluation of service responsiveness and the detection of network or server problems. Traffic analysis is the most common strategy for ...
A survey on detection techniques for cryptographic ransomware
(IEEE, 2019)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, ...
Ransomware encrypted your files but you restored them from network traffic
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium ...