The increasing performance requirements of today's Internet applications demand a reliable mechanism to transfer data. Many applications rely on the Transmission Control Protocol …
We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count …
Network traffic monitoring uses empirical entropy to detect anomalous events such as various types of attacks. However, the exact computation of the entropy in high-speed …
The data plane, which used to provide a limited and fixed set of operations in legacy networking devices, is now programmable. The de-facto language to program the data …
The performance of networked applications can be dramatically impacted by the size of the buffer at the bottleneck router. Shallow buffers may increase packet losses and decrease …
T Yang, C Wang, T Zhou, Z Cai… - Computers, Materials …, 2022 - scholars.cityu.edu.hk
Malicious attacks can be launched by misusing the network address translation technique as a camouflage. To mitigate such threats, network address translation identification is …
The performance of networks today is drastically affected by: 1) switches equipped with large buffers, referred to as “bloated buffers”: due to the lack of programmability and traffic …
Abstract The Transmission Control Protocol (TCP) forms the foundation of reliable end-to- end communication and is widely used by many applications for efficient data transfers …
This paper describes the deployment of a private cloud and the development of virtual laboratories and companion material to teach and train engineering students and …