• NetMine

  • Referenced in 2 articles [sw02020]
  • Characterizing network traffic by means of the NetMine framework The NetMine framework allows the characterization ... traffic data by means of data mining techniques. NetMine performs generalized association rule extraction ... high level abstraction of the network traffic and allows the discovery of unexpected and more ... network dumps showed the efficiency and effectiveness of the NetMine framework to characterize traffic data...
  • BotSniffer

  • Referenced in 3 articles [sw21739]
  • botnet command and control channels in network traffic...
  • TOTEM

  • Referenced in 7 articles [sw14949]
  • toolbox. We present the TOTEM open source Traffic Engineering (TE) toolbox ... They are suitable for network optimisation, better routing of traffic for providing QoS, load balancing ... operational network, or used off-line as an optimisation tool or as a traffic engineering...
  • A-RESCUE

  • Referenced in 3 articles [sw20579]
  • oversimplified traffic assignments and, as a result, inaccurate evacuation clearance times in the network ... behavior of the evacuating households with the network level assignment to predict and evaluate evacuation ... routing strategy that can achieve efficient network-wide traffic measurements is proposed. Computational results ... road network geometry. The simulation results demonstrate the evolution of traffic congestion as a function...
  • MNTG

  • Referenced in 1 article [sw07513]
  • extensible web-based traffic generator Road network traffic datasets have attracted significant attention ... temporal databases area, researchers harness road network traffic data to evaluate and validate their research ... Brinkhoff and BerlinMOD. Unfortunately, existing road network traffic generators require significant amount of time ... MNTG); an extensible web-based road network traffic generator that overcomes the hurdles of using...
  • BotFinder

  • Referenced in 1 article [sw21738]
  • BotFinder: Finding bots in network traffic without deep packet inspection. Bots are the root cause ... installations, or, if they operate on network traffic, require deep packet inspection for signature matching ... level properties of the bot’s network traffic. BotFinder does not rely on content analysis ... able to detect bots in network traffic without the need of deep packet inspection, while...
  • SUMO

  • Referenced in 14 articles [sw21660]
  • continuous road traffic simulation package designed to handle large road networks. It is mainly developed...
  • Gnort

  • Referenced in 5 articles [sw14147]
  • challenges to network intrusion detection systems (NIDS), which must cope with higher traffic throughput ... Gbit/s using synthetic network traces, while when monitoring real traffic using a commodity Ethernet interface...
  • EpiChord

  • Referenced in 2 articles [sw11774]
  • reactive routing state maintenance strategy that amortizes network maintenance costs into existing lookups ... from observing lookup traffic to improve lookup performance, and only sends network probes when necessary ... populate their caches mainly from observing network traffic, and cache entries are flushed from...
  • DTA

  • Referenced in 3 articles [sw35454]
  • Computing dynamic user equilibria on large-scale networks with software implementation. Dynamic user equilibrium ... most widely studied form of dynamic traffic assignment (DTA), in which road travelers engage ... varying traffic flows on a network consistent with traffic flow theory and travel behavior. This ... documents theoretical and numerical advances in synthesizing traffic flow theory and DUE modeling, by presenting...
  • PCAV

  • Referenced in 2 articles [sw02612]
  • network scanning activities. PCAV displays network traffic on the plane of parallel coordinates using ... simple but novel way of displaying traffic reveals ongoing attacks. From the fact that numerous ... quickly detect new attacks and enables network administrators to instantly recognize and respond ... effectiveness of PCAV using real attack traffics...
  • CONTRAM

  • Referenced in 4 articles [sw20603]
  • computer model of time-varying traffic in road networks, which takes as input the network ... resulting network flows, routes and travel times. It combines a macroscopic time-sliced traffic model ... with disaggregate dynamic assignment of traffic, so is intermediate between macroscopic equilibrium and microscopic models ... central role, and the treatment of network definition, user classes, road capacities, signals and coordination...
  • Rishi

  • Referenced in 2 articles [sw21756]
  • mainly based on passively monitoring network traffic for unusual or suspicious IRC nicknames, IRC servers ... administrator. Within the 10 GBit network of RWTH Aachen university, we detected 82 bot-infected...
  • Globule

  • Referenced in 2 articles [sw01289]
  • user-perceived latency and wide-area network traffic. This paper presents the design of Globule...
  • DynaCHINA

  • Referenced in 1 article [sw21411]
  • area is explored by the dynamic traffic network analysis method. Firstly, the operational states ... regional traffic network are obtained by simulation method based on the self-developed traffic simulation ... traffic simulation processes more suitable to regional optimization were designed exactly. Finally, a regional network ... strong scientific and technological support for the traffic management department...
  • SWiMNet

  • Referenced in 4 articles [sw01600]
  • detailed modeling of mobility, call traffic, and PCS network deployment. SWiMNet is based upon event...
  • Autograph

  • Referenced in 16 articles [sw23929]
  • protect the hosts on its local edge network from compromise and denial of service ... byte patterns sought in monitored traffic to identify worms--today entails non-trivial human labor ... thus significant delay: as network operators detect anomalous behavior, they communicate with one another...
  • Flamingo

  • Referenced in 1 article [sw12239]
  • Flamingo: visualizing internet traffic. In this paper we describe a set of visualization techniques that ... managing a network by representing network traffic information in a concise and intuitive manner ... that can be used to explore Internet traffic flow data. Flamingo is able to process ... feeds from devices in the network that can sample traffic, and then sending processed information...
  • CityTrafficSimulator

  • Referenced in 1 article [sw12663]
  • software for small- to medium-sized traffic networks, such as intersections or small urban areas ... multiple nodes, creating a network of paths on which the traffic will be simulated ... more network nodes to control the traffic flow...
  • ToolBus

  • Referenced in 8 articles [sw02041]
  • interaction in intelligent networks, and to build a simulator for traffic light control. We give...