Analysis and optimality on network traffic flows

被引:0
|
作者
School of Computer Science and Information Engineering, Chongqing Technology and Business University, Chongqing,400067, China [1 ]
不详 [2 ]
机构
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
5171297
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Simulation of Traffic Flows on the Road Network of Urban Area
    Ugnenko, Evgeniya
    Uzhvieva, Elena
    Voronova, Yelizaveta
    PROCEEDINGS OF THE 9TH INTERNATIONAL SCIENTIFIC CONFERENCE (TRANSBALTICA 2015), 2016, 134 : 153 - 156
  • [32] On the Optimality of Trust Network Analysis with Subjective Logic
    Park, Yongsu
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2014, 14 (03) : 49 - 54
  • [33] Global efficiency and network structure of urban traffic flows: A percolation-based empirical analysis
    Kwon, Yungi
    Jung, Jung-Hoon
    Eom, Young-Ho
    CHAOS, 2023, 33 (11)
  • [34] GENERALIZED PRINCIPLE OF OPTIMALITY IN PANSYSTEMS NETWORK ANALYSIS
    WU, SZ
    WU, XM
    KYBERNETES, 1984, 13 (04) : 231 - 235
  • [35] Network Traffic Prediction Based on the Feature of Newly-Generated Network Flows
    Li, Shaohe
    Song, Junping
    Xu, Luyang
    Hu, Yahui
    Luo, Wanming
    Zhou, Xu
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [36] ANALYSIS AND FORECAST OF THE GLOBAL CONTAINER TRAFFIC FLOWS
    Jugovic, Tanja Poletan
    POMORSTVO-SCIENTIFIC JOURNAL OF MARITIME RESEARCH, 2008, 22 (01) : 53 - 71
  • [37] A method of classifying multimedia traffic flows based on neural network
    Xue, JS
    Wang, GX
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1249 - 1252
  • [38] Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic
    Heydari, Banafsheh
    Yajam, Habib
    Akhaee, Mohammad Ali
    Salehkalaibar, Sadaf
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 25 - 30
  • [39] InCC: Evading Interception and Inspection by Mimicking Traffic in Network Flows
    Campo Giralte, Luis
    Martin de Diego, Isaac
    Conde, Cristina
    Cabello, Enrique
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 209 - 225
  • [40] Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows
    Kocak, Fatih
    Miller, David J.
    Kesidis, George
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,