Academic literature on the topic 'Applicative level packets processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Applicative level packets processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Applicative level packets processing"
Fais, Alessandra, Giuseppe Lettieri, Gregorio Procissi, Stefano Giordano, and Francesco Oppedisano. "Data Stream Processing for Packet-Level Analytics." Sensors 21, no. 5 (March 3, 2021): 1735. http://dx.doi.org/10.3390/s21051735.
Full textErmakov, R. N. "CLASSIFICATION OF NETWORK PROTOCOLS WITH APPLICATION OF MACHINE LEARNING METHODS AND FUZZY LOGIC ALGORITHMS IN TRAFFIC ANALYSIS SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 189 (March 2020): 37–48. http://dx.doi.org/10.14489/vkit.2020.03.pp.037-048.
Full textKamble, Suchita, and N. N. Mhala. "Controller for Network Interface Card on FPGA." International Journal of Reconfigurable and Embedded Systems (IJRES) 1, no. 2 (July 1, 2012): 55. http://dx.doi.org/10.11591/ijres.v1.i2.pp55-58.
Full textKim, Beom-Su, Sangdae Kim, Kyong Hoon Kim, Tae-Eung Sung, Babar Shah, and Ki-Il Kim. "Adaptive Real-Time Routing Protocol for (m,k)-Firm in Industrial Wireless Multimedia Sensor Networks." Sensors 20, no. 6 (March 14, 2020): 1633. http://dx.doi.org/10.3390/s20061633.
Full textMUROOKA, TAKAHIRO, AKIRA NAGOYA, TOSHIAKI MIYAZAKI, HIROYUKI OCHI, and YUKIHIRO NAKAMURA. "NETWORK PROCESSOR FOR HIGH-SPEED NETWORK AND QUICK PROGRAMMING." Journal of Circuits, Systems and Computers 16, no. 01 (February 2007): 65–79. http://dx.doi.org/10.1142/s0218126607003502.
Full textomran alkaam, nora. "Image Compression by Wavelet Packets." Oriental journal of computer science and technology 11, no. 1 (March 20, 2018): 24–28. http://dx.doi.org/10.13005/ojcst11.01.05.
Full textAhmadi, Mahmood, and Stephan Wong. "A Cache Architecture for Counting Bloom Filters: Theory and Application." Journal of Electrical and Computer Engineering 2011 (2011): 1–10. http://dx.doi.org/10.1155/2011/475865.
Full textKorobeynikov, A. V. "Synthesis of a packet of pulse with phase manipulation with side lobes level 1/N at incoherent accumulation." Issues of radio electronics 49, no. 5 (July 5, 2020): 28–34. http://dx.doi.org/10.21778/2218-5453-2020-5-28-34.
Full textČASTOVÁ, NINA, DAVID HORÁK, and ZDENĚK KALÁB. "DESCRIPTION OF SEISMIC EVENTS USING WAVELET TRANSFORM." International Journal of Wavelets, Multiresolution and Information Processing 04, no. 03 (September 2006): 405–14. http://dx.doi.org/10.1142/s0219691306001336.
Full textNeeb, C., M. J. Thul, and N. Wehn. "Application driven evaluation of network on chip architectures forcation parallel signal processing." Advances in Radio Science 2 (May 27, 2005): 181–86. http://dx.doi.org/10.5194/ars-2-181-2004.
Full textDissertations / Theses on the topic "Applicative level packets processing"
Trabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.
Full textThe goal of Distributed Denial of Service attacks (DDoS) is to prevent legitimate users from using a service. The availability of the service is attacked by sending altered packets to the victim. These packets either consume a large part of networks bandwidth, or create an artificial consumption of victim’s key resources such as memory or CPU. DDoS’ filtering is still an important problem for network operators since illegitimate traffics look like legitimate traffics. The discrimination of both classes of traffics is a hard task. Moreover DDoS victims are not limited to end users (e. G. Web server). The network is likely to be attacked itself. The approach presented in this thesis is pragmatic. Firstly it seeks to control dynamic and distributed aspects of DDoS. Secondly it looks for protecting legitimate traffics and the network against collateral damages. Thus we propose a distributed infrastructure of defense based on nodes dedicated to the analysis and the filtering of the illegitimate traffic. Each node is associated with one POP router or interconnection router in order to facilitate its integration into the network. These nodes introduce the required programmability through open interfaces. The programmability offers applicative level packets processing, and thus treatments without collateral damages. A prototype has been developed. It validates our concepts
Book chapters on the topic "Applicative level packets processing"
Kim, Jeong Seob, Dae Sung Lee, Ki Chang Kim, and Jae Hyun Park. "Ensuring Immediate Processing of Real-Time Packets at Kernel Level." In Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops, 738–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11942634_76.
Full textToroczkai, Zoltan, and György Korniss. "Scalability, Random Surfaces, and Synchronized Computing Networks." In Computational Complexity and Statistical Physics. Oxford University Press, 2005. http://dx.doi.org/10.1093/oso/9780195177374.003.0020.
Full textConference papers on the topic "Applicative level packets processing"
Odegbile, Olufemi, Chaoyi Ma, Shigang Chen, Dimitrios Melissourgos, and Haibo Wang. "Hierarchical Virtual Bitmaps for Spread Estimation in Traffic Measurement." In 11th International Conference on Computer Science and Information Technology (CCSIT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110718.
Full textHuang, Liling, Ahmad Beirami, Mohsen Sardari, Faramarz Fekri, Bo Liu, and Lin Gui. "Packet-level clustering for memory-assisted compression of network packets." In 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2014. http://dx.doi.org/10.1109/wcsp.2014.6992186.
Full textR. Simpson, William, and Kevin E. Foltz. "Network Defense in an End-to-End Paradigm." In 9th International Conference on Natural Language Processing (NLP 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101414.
Full text