We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Evolution of the Internet Topology and Traffic Dynamics of Data Packets

    In recent years, the Internet has become one of the most influential media in our daily life, going beyond in its role as the basic infrastructure in...
    Kwang-Il Goh, Byungnam Kahng, Doochul Kim in Complex Dynamics in Communication Networks
    Chapter
  2. Synchronization in Complex Networks

    The study of complex systems pervades all of science, from cell biology to ecology, from computer science to meteorology. A paradigm of a complex...
    Ljupco Kocarev, Gábor Vattay in Complex Dynamics in Communication Networks
    Chapter
  3. Data Traffic, Topology and Congestion

    We consider the interaction between the topology of a network and the tra.c carried along its channels. The binding elements between the topology and...
    David K. Arrowsmith, R.J. Mondrag, M. Woolf in Complex Dynamics in Communication Networks
    Chapter
  4. Nonlinear Instabilities in TCP-RED

    With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can...
    Priya Ranjan, Eyad H. Abed, Richard J. La in Complex Dynamics in Communication Networks
    Chapter
  5. Dynamics of Congestion Control

    One reason for the success of TCP and its widespread usage in the Internet is its ability to control network congestion. A TCP source uses implicit...
    Chapter
  6. Statistical Properties of Chaos in Communication Networks

    The behavior of communication networks, like the Internet is complex in many ways. This complexity may have many origins, including the topology of...
    Gábor Vattay, K. Diriczi, ... J. Stéger in Complex Dynamics in Communication Networks
    Chapter
  7. Modeling TCP/RED: a Dynamical Approach

    Today’s Internet applications, such as World Wide Web, file transfer, Usenet news, and remote login, are delivered via Transmission Control Protocol...
    Hui Zhang, Mingjian Liu, ... Ljiljana Trajković in Complex Dynamics in Communication Networks
    Chapter
  8. On Dynamics of Transport Protocols Over Wide-Area Internet Connections

    The Transport Control Protocol (TCP) is widely deployed over the Internet for reliably transporting data [27], and it accounts for a significant...
    Nageswara S.V. Rao, Jianbo Gao, Leon O. Chua in Complex Dynamics in Communication Networks
    Chapter
  9. Macroscopic Dynamics in Large-Scale Data Networks

    Modern society grows increasingly reliant on the Internet, a network of global reach that supports many services and clients. However, in such a...
    Jian Yuan, Kevin Mills in Complex Dynamics in Communication Networks
    Chapter
  10. Chaos-Based Generation of Arti.cial Self-Similar Traffic

    The exploitation of the unique features of chaotic dynamics for performance improvement recently became a widely followed path in several field of...
    Gianluca Setti, Riccardo Rovatti, Gianluca Mazzini in Complex Dynamics in Communication Networks
    Chapter
  11. Nonlinear Dynamics of TCP and its Implications to Network Performance

    TCP flows continuously intertwine in the Internet competing with each other for service capacity and buffer space in bottleneck routers. The window...
    András Veres, Miklós Boda in Complex Dynamics in Communication Networks
    Chapter
  12. Modelling the Complex Internet Topology

    Internet is one of the most impressive creatures of our civilization; it has literally changed the ways we do business, communication, education,...
    Guanrong Chen, Zheng** Fan, **ang Li in Complex Dynamics in Communication Networks
    Chapter
  13. Dynamic Complexity in the Internet Traffic

    The Internet is one of the most enormous autonomously distributed network systems created by human being. There is no central control in the Internet...
    Chapter
  14. Dynamical Properties of Externally Driven TCP traffic

    One of the most influential achievements of the last sanctuary was the emergence of a decentralized, highly heterogenous, global communication...
    Gábor Simon, Péter Pollner, ... István Csabai in Complex Dynamics in Communication Networks
    Chapter
  15. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  16. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  17. Correction: ChatGPT is bullshit

    Michael Townsen Hicks, James Humphries, Joe Slater in Ethics and Information Technology
    Article Open access 11 July 2024
  18. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  19. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  20. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
Did you find what you were looking for? Share feedback.