[PDF][PDF] On the building blocks of quality of service in heterogeneous IP networks

J Soldatos, E Vayias, G Kormentzas - IEEE Communications Surveys …, 2005 - academia.edu
After more than a decade of active research on Quality of Service in IP networks and the
Internet, the majority of IP traffic relies on the conventional best-effort IP service model …

Detection of economic denial of sustainability (EDoS) threats in self-organizing networks

MAS Monge, JM Vidal, GM Pérez - Computer Communications, 2019 - Elsevier
This paper reviews the threat of economic denial of sustainability on recent communication
networks and discusses their adaptation to emergent scenarios suited for self-organization …

[图书][B] Performance evaluation of computer and communication systems

JY Le Boudec - 2010 - api.taylorfrancis.com
Performance evaluation is often the critical part of evaluating the results of a research
project. Many of us are familiar with simulations, but it is frequently difficult to address …

Self-configuring network traffic generation

J Sommers, P Barford - Proceedings of the 4th ACM SIGCOMM …, 2004 - dl.acm.org
The ability to generate repeatable, realistic network traffic is critical in both simulation and
testbed environments. Traffic generation capabilities to date have been limited to either …

GNN-based hierarchical deep reinforcement learning for NFV-oriented online resource orchestration in elastic optical DCIs

B Li, Z Zhu - Journal of Lightwave Technology, 2022 - opg.optica.org
Network function virtualization (NFV) in elastic optical datacenter interconnections (EO-
DCIs) enables flexible and timely deployment of network services. However, as the service …

Network traffic classification using k-means clustering

Y Liu, W Li, Y Li - Second international multi-symposiums on …, 2007 - ieeexplore.ieee.org
Network traffic classification and application identification provide important benefits for IP
network engineering, management and control and other key domains. Current popular …

Edge device identification based on federated learning and network traffic feature engineering

Z He, J Yin, Y Wang, G Gui, B Adebisi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the ubiquitous deployment and applications of Internet of Things (IoT), security issues
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …

[图书][B] Large deviations for Gaussian queues: modelling communication networks

M Mandjes - 2007 - books.google.com
In recent years the significance of Gaussian processes to communication networks has
grown considerably. The inherent flexibility of the Gaussian traffic model enables the …

Harpoon: a flow-level traffic generator for router and network tests

J Sommers, H Kim, P Barford - ACM SIGMETRICS Performance …, 2004 - dl.acm.org
We describe Harpoon, a new application-independent tool for generating representative
packet traffic at the IP flow level. Harpoon is a configurable tool for creating TCP and UDP …

HFedDI: A novel privacy preserving horizontal federated learning based scheme for IoT device identification

MV Shenoy - Journal of Network and Computer Applications, 2023 - Elsevier
As the number of IoT devices that are getting connected to the Internet is increasing, there is
a need to automatically detect the IoT devices connected to the network for efficient network …