Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
The Internet and the devices that connect to it consume a growing and significant amount of electricity. The utilization of desktop to switch Ethernet links is generally very low ...
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Most of the work on grid technology in the video area has been generally restricted to aspects of resource scheduling and replica management. The traffic of such a service has a lo...
Peng Gao, Tao Liu, Yanming Chen, Xingyao Wu, Yehia...
The trend of the networking processing is to increase the intelligence of the routers (i.e. security capacities). This means that there is an increment in the workload generated p...