Статті в журналах з теми "Packet traffic"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Packet traffic".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Chen, Xu-Yang, Lu Han, De-Chuan Zhan, and Han-Jia Ye. "MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 15 (2025): 15922–29. https://doi.org/10.1609/aaai.v39i15.33748.
Повний текст джерелаDr., Paravathi C., D. Roshini, and S. Nayak Shwetha. "Packet Sniffing." International Journal of Engineering and Management Research 14, no. 1 (2024): 71–76. https://doi.org/10.5281/zenodo.10686707.
Повний текст джерелаShafiq, Muhammad, and Xiangzhan Yu. "Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification." Mobile Information Systems 2017 (2017): 1–22. http://dx.doi.org/10.1155/2017/3146868.
Повний текст джерелаNisar, Kashif. "Fourth Stage of Voice Priority Queue for VoIP over WLANs." International Journal of Interdisciplinary Telecommunications and Networking 4, no. 2 (2012): 48–63. http://dx.doi.org/10.4018/jitn.2012040104.
Повний текст джерелаHadap, Prof Manish, Chanchal Halwe, Sakshi Wase, et al. "Network Packet Sniffing and Monitoring." International Journal of Advances in Engineering and Management 6, no. 10 (2024): 260–66. https://doi.org/10.35629/5252-0610260266.
Повний текст джерелаOgbimi, Voke, and Emuejevoke Francis. "An Improved Error Control Model in Packet Switched Wide Area Networks." Transactions on Networks and Communications 7, no. 4 (2019): 01–18. http://dx.doi.org/10.14738/tnc.74.7263.
Повний текст джерелаPustovoitov, Pavlo, Vitalii Voronets, Oleksandr Voronets, Halyna Sokol, and Maksym Okhrymenko. "Assessment of QOS indicators of a network with UDP and TCP traffic under a node peak load mode." Eastern-European Journal of Enterprise Technologies 1, no. 4 (127) (2024): 23–31. http://dx.doi.org/10.15587/1729-4061.2024.299124.
Повний текст джерелаBerqia, Amine, Mohamed Hanini, and Abdelkrim Haqiq. "Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3,5G Network." International Journal of Mobile Computing and Multimedia Communications 4, no. 1 (2012): 57–68. http://dx.doi.org/10.4018/jmcmc.2012010105.
Повний текст джерелаErmakov, R. N. "CLASSIFICATION OF NETWORK PROTOCOLS WITH APPLICATION OF MACHINE LEARNING METHODS AND FUZZY LOGIC ALGORITHMS IN TRAFFIC ANALYSIS SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 189 (March 2020): 37–48. http://dx.doi.org/10.14489/vkit.2020.03.pp.037-048.
Повний текст джерелаLozhkovskyi, A. G., V. A. Turchyn, and V. S. Andriiaka. "INFLUENCE OF CALCULATION ACCURACY OF TRAFFIC SELF-SIMILARITY EXPONENT ON A QUALITY OF SERVICE CHARACTERISTICS." Proceedings of the O.S. Popov ОNAT 1, no. 1 (2020): 88–94. http://dx.doi.org/10.33243/2518-7139-2020-1-1-88-94.
Повний текст джерелаSumeet, Bissa, Dadhich Harish, Kumar Sudhir, and Kansara Himanshu. "Comparative Study of AQT, FIS, RFC and TCAM Algorithms." Advancement of Computer Technology and its Applications 2, no. 3 (2019): 1–5. https://doi.org/10.5281/zenodo.3490553.
Повний текст джерелаMeleshko, Yelyzaveta, Hanna Drieieva, Oleksandr Drieiev, Mykola Yakymenko, Volodymyr Mikhav, and Serhii Shymko. "A Method of Routing of Fractal-like Traffic with Prediction of Router Load for Reduce the Probability of Network Packet Loss." Computational Linguistics and Intelligent Systems, COLINS 2023 (ISSN 16130073) III (May 25, 2023): 434–48. https://doi.org/10.5281/zenodo.8231189.
Повний текст джерелаJiang, Chao, Jinlin Wang, and Yang Li. "An Efficient Indexing Scheme for Network Traffic Collection and Retrieval System." Electronics 10, no. 2 (2021): 191. http://dx.doi.org/10.3390/electronics10020191.
Повний текст джерелаMutalemwa, Lilian C., and Seokjoo Shin. "Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks." Energies 13, no. 2 (2020): 292. http://dx.doi.org/10.3390/en13020292.
Повний текст джерелаNisar, Kashif, and Suhaidi Hassan. "Mobility of Mobile Station in Voice Priority Queue Scheduler for VoIPWLANs." Journal of Communications and Computer Engineering 2, no. 3 (2011): 28. http://dx.doi.org/10.20454/jcce.2012.249.
Повний текст джерелаYang, Jianhua, and Lixin Wang. "Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection." Sensors 21, no. 22 (2021): 7464. http://dx.doi.org/10.3390/s21227464.
Повний текст джерелаOIDA, K., and K. SHINJO. "CHARACTERISTICS OF DETERMINISTIC OPTIMAL ROUTING FOR TWO HETEROGENEOUS PARALLEL SERVERS." International Journal of Foundations of Computer Science 12, no. 06 (2001): 775–90. http://dx.doi.org/10.1142/s0129054101000862.
Повний текст джерелаCao, Ping, and Jian Zhang. "Topology-Based Traffic Identification Method with Heuristic Rules." Advanced Materials Research 588-589 (November 2012): 1427–30. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.1427.
Повний текст джерелаLozhkovskyi, A. G., and K. D. Guliaiev. "CALCULATING METHOD OF THE PACKET NETWORK ACCESS TRAFFIC CAPACITY FOR IoT DEVICES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (2020): 31–40. http://dx.doi.org/10.33243/2518-7139-2020-1-2-31-40.
Повний текст джерелаFrantti, Tapio. "Cascaded Fuzzy Congestion Controller for TCP/IP Traffic." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 2 (2005): 92–99. http://dx.doi.org/10.20965/jaciii.2005.p0092.
Повний текст джерелаDr., Anamol Chand Jain. "Protocols and Techniques for End to End Congestion Avoidance on a Global Internet." Applied Science & Engineering Journal for Advanced Research 3, no. 1 (2024): 32–38. https://doi.org/10.5281/zenodo.10717806.
Повний текст джерелаTsmots, I. G., and S. V. Tesliuk. "MODELS AND TOOLS OF THE AUTOMATED SYSTEM FOR COMPUTER NETWORK TRAFFIC INVESTIGATION USING BERKELEY PACKET FILTER." Ukrainian Journal of Information Technology 4, no. 2 (2022): 61–67. http://dx.doi.org/10.23939/ujit2022.02.061.
Повний текст джерелаMun, Hyunsu, and Youngseok Lee. "Internet Traffic Classification with Federated Learning." Electronics 10, no. 1 (2020): 27. http://dx.doi.org/10.3390/electronics10010027.
Повний текст джерелаIsmail, Nanang, Eki Ahmad Zaki, and Muhamad Arghifary. "Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol." CommIT (Communication and Information Technology) Journal 11, no. 2 (2017): 57. http://dx.doi.org/10.21512/commit.v11i2.2105.
Повний текст джерелаLozhkovskyi, Anatoliy, and Yevgeniy Levenberg. "Calculation of average time of packet delay in the storage buffer of a single-channel system with self-similar traffic." Computational Problems of Electrical Engineering 7, no. 2 (2017): 87–91. https://doi.org/10.23939/jcpee2017.02.087.
Повний текст джерелаMoon, Daekyeong. "Network Traffic Characteristics and Analysis in Recent Mobile Games." Applied Sciences 14, no. 4 (2024): 1397. http://dx.doi.org/10.3390/app14041397.
Повний текст джерелаFaisal, Mohammed, Jia Uddin, and Shimul Shil. "Performance of VoIP Networks Using MPLS Traffic Engineering." Advanced Materials Research 457-458 (January 2012): 927–30. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.927.
Повний текст джерелаYIN, XIANG-LAN, HUA CHEN, and YANG SHEN. "PBQM: A PRIORITY-BASED QUEUE MANAGEMENT METHOD FOR WIRELESS SENSOR NETWORKS." International Journal of Information Acquisition 04, no. 01 (2007): 39–46. http://dx.doi.org/10.1142/s0219878907001149.
Повний текст джерелаTervydis, Paulius, and Ramutis Rindzevičius. "INVESTIGATION OF BATCH DATA FLOW TRANSMISSION PARAMETERS." Technological and Economic Development of Economy 12, no. 4 (2006): 327–33. http://dx.doi.org/10.3846/13928619.2006.9637762.
Повний текст джерелаMohammed, Subhi A. "DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 25–43. http://dx.doi.org/10.31987/ijict.2.2.67.
Повний текст джерелаSu Khin, Chit, Aye Thandar Kyaw, Myo Myint Maw, and May Zin Oo. "Reducing Packet-In Messages in OpenFlow Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 20, no. 1 (2022): 1–9. http://dx.doi.org/10.37936/ecti-eec.2022201.244944.
Повний текст джерелаKhan, Fazeel Ahmed, and Adamu Abubakar Ibrahim. "Machine Learning-based Enhanced Deep Packet Inspection for IP Packet Priority Classification with Differentiated Services Code Point for Advance Network Management." Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 16, no. 2 (2024): 5–12. http://dx.doi.org/10.54554/jtec.2024.16.02.002.
Повний текст джерелаDomańska, J., D. R. Augustyn, and A. Domański. "The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic." Bulletin of the Polish Academy of Sciences: Technical Sciences 60, no. 4 (2012): 779–86. http://dx.doi.org/10.2478/v10175-012-0090-x.
Повний текст джерелаEspinal, Albert, and V. Sanchez Padilla. "Queuing Delay Reduction based on Network Traffic Patterns: A Predictive QoS Framework For Point-To-Point Communications." Transport and Telecommunication Journal 26, no. 3 (2025): 237–49. https://doi.org/10.2478/ttj-2025-0018.
Повний текст джерелаHwang, Ren-Hung, Min-Chun Peng, Van-Linh Nguyen, and Yu-Lun Chang. "An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level." Applied Sciences 9, no. 16 (2019): 3414. http://dx.doi.org/10.3390/app9163414.
Повний текст джерелаKhan, Anwar, Sayeed Ghani, and Shama Siddiqui. "A Preemptive Priority-Based Data Fragmentation Scheme for Heterogeneous Traffic in Wireless Sensor Networks." Sensors 18, no. 12 (2018): 4473. http://dx.doi.org/10.3390/s18124473.
Повний текст джерелаKo, Jongbin, Jungtaek Seo, Eui-Jik Kim, and Taeshik Shon. "Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 31. http://dx.doi.org/10.5772/50256.
Повний текст джерелаEzema, Chukwuedozie N., Chinazam Ezemab C. Ezemab, and Chukwuebuka B. Umezinwac. "TRAFFIC DESIGN MODEL FOR OPTIMUM PERFORMANCE ENHANCEMENTS OF IEEE 802.11B QOS PARAMETERS." European Journal of Technology 1, no. 2 (2017): 91. http://dx.doi.org/10.47672/ejt.228.
Повний текст джерелаPL, Subramanian. "Network Sniffing Tool." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48681.
Повний текст джерелаLamzabi, S., S. Lazfi, H. Ez-Zahraouy, A. Benyoussef, A. Rachadi, and S. Ziti. "Pair-dependent rejection rate and its impact on traffic flow in a scale-free network." International Journal of Modern Physics C 25, no. 07 (2014): 1450019. http://dx.doi.org/10.1142/s0129183114500193.
Повний текст джерелаThipparthi Upendra Chari and B Srinivasa S P Kumar. "RBP: a website fingerprinting obfuscation method against intelligent fingerprintingattacks." international journal of engineering technology and management sciences 6, no. 6 (2022): 398–403. http://dx.doi.org/10.46647/ijetms.2022.v06i06.071.
Повний текст джерелаSetthawong, Pisai, and Surat Tanterdtid. "Non-Flooding Bridging Solutions for Resilient Packet Rings." ECTI Transactions on Electrical Engineering, Electronics, and Communications 6, no. 1 (2007): 38–46. http://dx.doi.org/10.37936/ecti-eec.200861.171753.
Повний текст джерелаHaywood, Gregor Tamati, and Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths." Cryptography 8, no. 2 (2024): 22. http://dx.doi.org/10.3390/cryptography8020022.
Повний текст джерелаNguyen, VanDung, Tran Anh Khoa, Thant Zin Oo, Nguyen H. Tran, Choong Seon Hong, and Eui-Nam Huh. "Time Slot Utilization for Efficient Multi-Channel MAC Protocol in VANETs." Sensors 18, no. 9 (2018): 3028. http://dx.doi.org/10.3390/s18093028.
Повний текст джерелаBikmukhamedo, Radion F., and Adel F. Nadeev. "Generative transformer framework for network traffic generation and classification." T-Comm 14, no. 11 (2020): 64–71. http://dx.doi.org/10.36724/2072-8735-2020-14-11-64-71.
Повний текст джерелаRazouqi, Qutaiba, Ahmed Boushehri, Mohamed Gaballa, Lina Alsaleh, and Maysam Abbod. "Extended Comparison and Performance Analysis for Mobile Ad-Hoc Networks Routing Protocols Based on Different Traffic Load Patterns and Performance Metrics." Electronics 13, no. 14 (2024): 2877. http://dx.doi.org/10.3390/electronics13142877.
Повний текст джерелаLozhkovskyi, A.G. "CALCULATION THE SERVICE WAITING PROBABILITY WITH SELF-SIMILAR NETWORK TRAFFIC." Journal of Engineering Science XXVI (2) (June 18, 2019): 35–39. https://doi.org/10.5281/zenodo.3249178.
Повний текст джерелаByeon, James K., Nurul I. Sarkar, and Jairo A. Gutiérrez. "The Impact of Traffic Type and Node Mobility on an 802.16 Mobile WiMAX for Varying Network Sizes." International Journal of Advanced Pervasive and Ubiquitous Computing 5, no. 4 (2013): 63–80. http://dx.doi.org/10.4018/ijapuc.2013100105.
Повний текст джерелаMONDRAGÓN C., RAÚL J. "A MODEL OF PACKET TRAFFIC USING A RANDOM WALL MODEL." International Journal of Bifurcation and Chaos 09, no. 07 (1999): 1381–92. http://dx.doi.org/10.1142/s021812749900095x.
Повний текст джерелаFauzan, Rifqi, Syariful Ikhwan, and Jafaruddin Gusti Amri Ginting. "ANALYSIS PERFORMANCE IN SOFTWARE DEFINED NETWORK (SDN) USING ARUBA VAN CONTROLLER." Jurnal Informatika: Jurnal Pengembangan IT 5, no. 3 (2020): 64–69. http://dx.doi.org/10.30591/jpit.v5i3.1937.
Повний текст джерела