We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-15 of 15 results
  1. Capturing Secured Application Traffic for Analysis

    Following the famous adage that goes “Necessity is the mother of any invention,” securing end-to-end traffic is an evolution happening for the past...
    Nagendra Kumar Nainar, Ashish Panda in Wireshark for Network Forensics
    Chapter 2023
  2. Optimizing APIs

    You now know how to develop endpoints, architect your applications, and access data efficiently. That’s all very well, but you can go even further. I...
    Chapter 2023
  3. Investigating the Overhead of the REST Protocol When Using Cloud Services for HPC Storage

    With the significant advances in Cloud Computing, it is inevitable to explore the usage of Cloud technology in HPC workflows. While many Cloud...
    Frank Gadban, Julian Kunkel, Thomas Ludwig in High Performance Computing
    Conference paper 2020
  4. Controlling Network Traffic Microstructures for Machine-Learning Model Probing

    Network intrusion detection (NID) models increasingly rely on learning traffic microstructures that consist of pattern sequences in features such as...
    Henry Clausen, Robert Flood, David Aspinall in Security and Privacy in Communication Networks
    Conference paper 2021
  5. Analysis of QUIC Session Establishment and Its Implementations

    In the recent years, the major web companies have been working to improve the user experience and to secure the communications between their users...
    Eva Gagliardi, Olivier Levillain in Information Security Theory and Practice
    Conference paper 2020
  6. Introduction to Cyber-Physical Systems

    This chapter begins with an overview of cyber-physical systems in Sect. 3.1 taking into account the introduction to systems in Chap....
    Chapter 2016
  7. Social Impact on Work Lives of the Future

    This chapter is a brief introduction to the social impact on the work lives of the future. Section 8.1 introduces the changes in manufacturing skills...
    Chapter 2016
  8. Systems and Software Engineering

    This chapter begins with a brief introduction to systems engineering in Sect. 6.1, which describes systems engineering as an interdisciplinary field...
    Chapter 2016
  9. Ubiquitous Computing

    This chapter begins with a brief overview of ubiquitous computing. Section 5.1 defines ubiquitous computing and illustrates some of its applications....
    Chapter 2016
  10. Digital Manufacturing/Industry 4.0

    This chapter begins with a brief introduction to manufacturing in Sect. 7.1, identifying the enabling technologies and opportunities with regard to...
    Chapter 2016
  11. A Novel Network Traffic Analysis Method Based on Fuzzy Association Rules

    For network traffic analysis and forecasting, a novel method based on fuzzy association rules is proposed in this paper. Connecting fuzzy logic...
    **nyu Yang, Wen**g Yang, ... Yi Shi in Modeling Decisions for Artificial Intelligence
    Conference paper 2004
  12. Socket Programming

    The Windows Sockets specification describes a common interface for networked Windows programs. WinSock uses TCP/IP communications and provides for...
    Chapter 2004
  13. Socket programming

    The Windows Sockets specification describes a common interface for networked Windows programs. WinSock uses TCP/IP communications and provides for...
    Chapter 2002
  14. Miscellaneous

    In addition to the basic architectural concepts described in the main chapters of this book, many additional technologies and concepts for the web...
    Erik Wilde in Wilde’s WWW
    Chapter 1999
  15. On the Integration of Legacy Information Servers into the World-Wide Web

    Today we see the synergy of two technologies: databases and networking. Tomorrows global information systems will integrate network technology and...
    Louis Perrochon in GISI 95
    Conference paper 1995
Did you find what you were looking for? Share feedback.