نتایج جستجو برای: communication and traffic infrastructures

تعداد نتایج: 16879347  

2009
Patrick Düssel Christian Gehl Pavel Laskov Jens-Uwe Bußer Christof Störmann Jan Kästner

With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carri...

2005
Félix Hernández-Campos Maria Papadopouli

Our goal is to perform a system-wide characterization of the workload of wireless access points (APs) in a production 802.11 infrastructure. The key issues of this study are the characterization of the traffic at each access point (AP), its modeling, and a comparison among APs of different wireless campus-wide infrastructures. Unlike most other studies, we compare two networks using similar dat...

Journal: :IEICE Transactions 2013
YoungHwa Jang Incheol Shin Byung-gil Min Jungtaek Seo MyungKeun Yoon

Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propose a whitelist-based detection system. Network a...

2006
Raffaele Bolla Roberto Bruschi Franco Davoli Andrea Ranieri Riccardo Rapuzzi Michele Sciuto

Today, a large part of the traffic carried by the Internet is generated by file-sharing applications based on the P2P paradigm. Moreover, P2P traffic has particular features, quite different from the ones generated by "classical" data applications, and generally causes highly dynamic and distributed traffic matrixes that heavily stress network infrastructures. With this respect, it is reasonabl...

Journal: :Dagstuhl Reports 2012
Georg Carle Hervé Debar Falko Dressler Hartmut König

The increasing dependence of human society on information technology (IT) systems requires appropriate measures to cope with their misuse. The growing potential of threats, which make these systems more and more vulnerable, is caused by the complexity of the technologies themselves. The potential of threats in networked systems will further grow as well as the number of individuals who are able...

2013
Peter Schartner Michael Hirschbichler Joachim Fabini Bernhard Seifert Christoph Egger

The switch of future telecommunication infrastructures to packet switched communication using the Internet Protocol (IP) raises new issues and challenges regarding security. Telecom operators will likely face challenges similar to the ones encountered in the last years by operators of established IP services like World Wide Web (WWW) or Email. The first part of this thesis presents attack scena...

2010
A. Luís Osório Hamideh Afsarmanesh Luis M. Camarinha-Matos

The intelligent transport systems, which aim at providing smarter transport infrastructures and sustainable mobility, are deeply grounded on the Information and Communication Technologies. Current trends in the development of integrated complex systems, such as integrated road/highway concessions management, require new strategies to match business processes to the underlying technology. New ro...

Journal: :IFAC-PapersOnLine 2022

While intelligent transport systems are preparing to welcome connected and automated vehicles (CAVs), it is uncertain which algorithms should be employed manage them. In particular, even though remarkable improvements in telecommunication technologies, such as vehicle-to-everything (V2X), enable communication computation sharing among different agents, e.g. infrastructures, distributed control ...

2005
Gabriel Antoniu Mathieu Jan David A. Noblet

As grid sizes increase, the need for self-organization and dynamic reconfigurations is becoming more and more important, and therefore the convergence of grid computing and Peer-to-Peer (P2P) computing seems natural. Grid infrastructures are generally available as a federation of SAN-based clusters interconnected by high-bandwidth WANs. However, P2P systems are usually running on the Internet, ...

2012
Nadine Vehring Kai Riemer

Implementing organization-wide ICT infrastructures is a challenging endeavor, even more so when the technology in question is both a network technology and raises privacy concerns among employees. This teaching case introduces students to the German insurance provider FINTOP in the final stages of planning its organization-wide roll-out of the Real Time Communication and Collaboration (RTC) tec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید