UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

3 4 5 6 7
hits: 2,085
41.
  • MapTask Scheduling in MapRe... MapTask Scheduling in MapReduce With Data Locality: Throughput and Heavy-Traffic Optimality
    Wang, Weina; Zhu, Kai; Ying, Lei ... IEEE/ACM transactions on networking, 2016-Feb., 2016-2-00, 20160201, Volume: 24, Issue: 1
    Journal Article
    Peer reviewed

    MapReduce/Hadoop framework has been widely used to process large-scale datasets on computing clusters. Scheduling map tasks with data locality consideration is crucial to the performance of ...
Full text
42.
  • A Survey on Big Data for Ne... A Survey on Big Data for Network Traffic Monitoring and Analysis
    D'Alconzo, Alessandro; Drago, Idilio; Morichetta, Andrea ... IEEE eTransactions on network and service management, 2019-Sept., 2019-9-00, Volume: 16, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Network Traffic Monitoring and Analysis (NTMA) represents a key component for network management, especially to guarantee the correct operation of large-scale networks such as the Internet. As the ...
Full text

PDF
43.
  • Critical parameters for cal... Critical parameters for calibration and validation of traffic studies
    Maleanu, M.; Racanel, C. IOP conference series. Earth and environmental science, 05/2023, Volume: 1185, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract Since the last two decades a lot of efforts were made in order to produce methodologies there are able to model traffic characteristics and present anticipative traffic condition. New ...
Full text
44.
  • A method for vulnerability ... A method for vulnerability detection by IoT network traffic analytics
    Brezolin, Uelinton; Vergütz, Andressa; Nogueira, Michele Ad hoc networks, 10/2023, Volume: 149
    Journal Article
    Peer reviewed

    The Internet of Things comprises wireless devices with limited computing resources. It targets attacks that exploit vulnerabilities such as unencrypted data transfer. Conventional vulnerability ...
Full text
45.
  • Comprehensive analysis of U... Comprehensive analysis of UK AADF traffic dataset set within four geographical regions of England
    Chang, Victor; Xu, Qianwen Ariel; Hall, Karl ... Expert systems, 12/2023, Volume: 40, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Abstract Traffic flow detection plays a significant part in freeway traffic surveillance systems. Currently, effective autonomous traffic analysis is a challenging task due to the complexity of ...
Full text
46.
  • Security and performance im... Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor
    Mitseva, Asya; Aleksandrova, Marharyta; Panchenko, Andriy Computers & security, September 2023, 2023-09-00, Volume: 132
    Journal Article
    Peer reviewed
    Open access

    Tor is the most popular anonymization network with millions of daily users. This makes it an attractive target for attacks, e.g., by malicious autonomous systems (ASs) performing active routing ...
Full text
47.
  • faaShark: An End-to-End Net... faaShark: An End-to-End Network Traffic Analysis System Atop Serverless Computing
    Zhao, Hongyu; Pan, Shanxing; Cai, Zinuo ... IEEE transactions on network science and engineering, 05/2024, Volume: 11, Issue: 3
    Journal Article
    Peer reviewed

    The prosperity of the Internet has made network traffic analysis increasingly indispensable in network operation. With the development of machine learning, more researchers and engineers are using ...
Full text
48.
  • MFMCNS: a multi-feature and... MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection
    Almashhadani, Ahmad O.; Carlin, Domhnall; Kaiiali, Mustafa ... Computers & security, October 2022, 2022-10-00, Volume: 121
    Journal Article
    Peer reviewed
    Open access

    Ransomware is a type of advanced malware that can encrypt a user’s files or lock a computer system until a ransom has been paid. Ransomworm is a type of malware that combines the payload of ...
Full text
49.
Full text

PDF
50.
  • Transit Smart Solution for ... Transit Smart Solution for Bratislava – Example of Tramway Network Development
    Schlosser, T; Schlosser, P; Korfant, M ... IOP conference series. Materials Science and Engineering, 10/2022, Volume: 1252, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract The research presented was on the table more years and covers the cooperation of the University staff with City of Bratislava binding with the activity of private company. The base task was ...
Full text
3 4 5 6 7
hits: 2,085

Load filters