Buscar
Mostrando ítems 1-10 de 44
Effective analysis of secure web response time
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
The measurement of response time in web based applications is a common task for the evaluation of service responsiveness and the detection of network or server problems. Traffic analysis is the most common strategy for ...
Ransomware encrypted your files but you restored them from network traffic
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium ...
Evaluación de los sistemas inalámbricos 802.11b en entornos de alta movilidad para su implantación en una red de Infostations
(2005)
info:eu-repo/semantics/conferenceObject,
Nowadays, users demand higher bandwidth Internet access with the ability to connect
anywhere (or, at least, many-where) at anytime, with no restrictions imposed by mobility or the kind of
information (voice or data) to ...
Garantía de calidad de servicio basada en la predicción del ancho de banda
(2001)
info:eu-repo/semantics/conferenceObject,
This paper presents the architecture and performance evaluation of a neuronal estimator
to predict network load in communication networks. System benchmarks are tested with real
network traffic picked up from the 155 Mbps ...
Traffic estimation in high-speed communication networks using fuzzy systems
(EUSFLAT, 2001)
info:eu-repo/semantics/conferenceObject,
We present a practical application of fuzzy systems in communication networks. In this
case a fuzzy relational model is developed
to estimate the bytes transferred every time
unit over a communication link. Such
estimation ...
Planificación de la calidad de servicio para el acceso a Internet de las operadoras de cable
(2002)
info:eu-repo/semantics/conferenceObject,
In this paper, the data traffic generated by users of
cablemodems is studied. This service must be guaranteed for
accomplishing certain Quality of Service and limiting the
maximum bandwidth per user.
The analysis presents ...
IP addresses distribution in Internet and its application on reduction methods for IP alias resolution
(IEEE, 2009)
info:eu-repo/semantics/conferenceObject,
Discovery of Internet topology is an important and open task. It is difficulted by the high number of networks and internetworking
equipments, and even by the dynamic of those interconnections. Mapping Internet at ...
High-speed analysis of SMB2 file sharing traffic without TCP stream reconstruction
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
This paper presents a file sharing traffic analysis methodology for Server Message Block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be ...
KISS methodologies for network management and anomaly detection
(IEEE, 2018)
info:eu-repo/semantics/conferenceObject,
Current networks are increasingly growing in size, complexity and the amount of monitoring data that they produce, which requires complex data analysis pipelines to handle data collection, centralization and analysis tasks. ...
Detecting disruption periods on TCP servers with passive packet traffic analysis
(IARIA, 2015)
Contribución a congreso / Biltzarrerako ekarpena,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...