We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Evolution of the Internet Topology and Traffic Dynamics of Data Packets

    In recent years, the Internet has become one of the most influential media in our daily life, going beyond in its role as the basic infrastructure in...
    Kwang-Il Goh, Byungnam Kahng, Doochul Kim in Complex Dynamics in Communication Networks
    Chapter
  2. Synchronization in Complex Networks

    The study of complex systems pervades all of science, from cell biology to ecology, from computer science to meteorology. A paradigm of a complex...
    Ljupco Kocarev, Gábor Vattay in Complex Dynamics in Communication Networks
    Chapter
  3. Data Traffic, Topology and Congestion

    We consider the interaction between the topology of a network and the tra.c carried along its channels. The binding elements between the topology and...
    David K. Arrowsmith, R.J. Mondrag, M. Woolf in Complex Dynamics in Communication Networks
    Chapter
  4. Nonlinear Instabilities in TCP-RED

    With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can...
    Priya Ranjan, Eyad H. Abed, Richard J. La in Complex Dynamics in Communication Networks
    Chapter
  5. Dynamics of Congestion Control

    One reason for the success of TCP and its widespread usage in the Internet is its ability to control network congestion. A TCP source uses implicit...
    Chapter
  6. Statistical Properties of Chaos in Communication Networks

    The behavior of communication networks, like the Internet is complex in many ways. This complexity may have many origins, including the topology of...
    Gábor Vattay, K. Diriczi, ... J. Stéger in Complex Dynamics in Communication Networks
    Chapter
  7. Modeling TCP/RED: a Dynamical Approach

    Today’s Internet applications, such as World Wide Web, file transfer, Usenet news, and remote login, are delivered via Transmission Control Protocol...
    Hui Zhang, Mingjian Liu, ... Ljiljana Trajković in Complex Dynamics in Communication Networks
    Chapter
  8. On Dynamics of Transport Protocols Over Wide-Area Internet Connections

    The Transport Control Protocol (TCP) is widely deployed over the Internet for reliably transporting data [27], and it accounts for a significant...
    Nageswara S.V. Rao, Jianbo Gao, Leon O. Chua in Complex Dynamics in Communication Networks
    Chapter
  9. Macroscopic Dynamics in Large-Scale Data Networks

    Modern society grows increasingly reliant on the Internet, a network of global reach that supports many services and clients. However, in such a...
    Jian Yuan, Kevin Mills in Complex Dynamics in Communication Networks
    Chapter
  10. Chaos-Based Generation of Arti.cial Self-Similar Traffic

    The exploitation of the unique features of chaotic dynamics for performance improvement recently became a widely followed path in several field of...
    Gianluca Setti, Riccardo Rovatti, Gianluca Mazzini in Complex Dynamics in Communication Networks
    Chapter
  11. Nonlinear Dynamics of TCP and its Implications to Network Performance

    TCP flows continuously intertwine in the Internet competing with each other for service capacity and buffer space in bottleneck routers. The window...
    András Veres, Miklós Boda in Complex Dynamics in Communication Networks
    Chapter
  12. Modelling the Complex Internet Topology

    Internet is one of the most impressive creatures of our civilization; it has literally changed the ways we do business, communication, education,...
    Guanrong Chen, Zheng** Fan, **ang Li in Complex Dynamics in Communication Networks
    Chapter
  13. Dynamic Complexity in the Internet Traffic

    The Internet is one of the most enormous autonomously distributed network systems created by human being. There is no central control in the Internet...
    Chapter
  14. Dynamical Properties of Externally Driven TCP traffic

    One of the most influential achievements of the last sanctuary was the emergence of a decentralized, highly heterogenous, global communication...
    Gábor Simon, Péter Pollner, ... István Csabai in Complex Dynamics in Communication Networks
    Chapter
  15. Smart Appliance Abnormal Electrical Power Consumption Detection

    Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home...
    Conference paper 2024
  16. Projective Space Stern Decoding and Application to SDitH

    We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size...
    Kevin Carrier, Valerian Hatey, Jean-Pierre Tillich in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  17. Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT

    Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of...
    Alex Baron, Laurens Le Jeune, ... Nele Mentens in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  18. Device Fingerprinting in a Smart Grid CPS

    Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms...
    Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, ... Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  19. Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries

    The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms...
    **aodong Ye, Teik Guan Tan, Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  20. Game Theoretic Modeling of Insider Threats in an Organization

    Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies....
    K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto in Applied Cryptography and Network Security Workshops
    Conference paper 2024
Did you find what you were looking for? Share feedback.