Sciweavers

295 search results - page 14 / 59
» Differentially-private network trace analysis
Sort
View
PUC
2007
116views more  PUC 2007»
13 years 9 months ago
Periodic properties of user mobility and access-point popularity
Understanding user mobility and its effect on access points (APs) is important in designing location-aware systems and wireless networks. Although various studies of wireless netwo...
Minkyong Kim, David Kotz
PAM
2007
Springer
14 years 4 months ago
Impact of Alias Resolution on Traceroute -Based Sample Network Topologies
Most Internet measurement studies utilize traceroute-collected path traces to build Internet maps. In this paper, we measure the impact of alias resolution problem on Internet topo...
Mehmet Hadi Gunes, Nicolas Sanchis Nielsen, Kamil ...
CNSR
2011
IEEE
257views Communications» more  CNSR 2011»
13 years 1 months ago
On Threshold Selection for Principal Component Based Network Anomaly Detection
—Principal component based anomaly detection has emerged as an important statistical tool for network anomaly detection. It works by projecting summary network information onto a...
Petar Djukic, Biswajit Nandy
CCS
2007
ACM
14 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
CCR
2002
72views more  CCR 2002»
13 years 10 months ago
Provisioning on-line games: a traffic analysis of a busy counter-strike server
This paper describes the results of a 500 million packet trace of a popular on-line, multi-player, game server. The results show that the traffic behavior of this heavily loaded ga...
Francis Chang, Wu-chang Feng, Wu-chi Feng, Jonatha...