network congestion
Recently Published Documents


TOTAL DOCUMENTS

509
(FIVE YEARS 130)

H-INDEX

20
(FIVE YEARS 3)

Author(s):  
Wei Zhou ◽  
Yuying Wang ◽  
Feixiang Peng ◽  
Ying Liu ◽  
Hui Sun ◽  
...  

Energy ◽  
2022 ◽  
Vol 240 ◽  
pp. 122835
Author(s):  
Javad Salehi ◽  
Amin Namvar ◽  
Farhad Samadi Gazijahani ◽  
Miadreza Shafie-khah ◽  
João P.S. Catalão

2022 ◽  
Vol 70 (1) ◽  
pp. 1363-1379
Author(s):  
Shabir Ahmad ◽  
Faisal Jamil ◽  
Abid Ali ◽  
Ehtisham Khan ◽  
Muhammad Ibrahim ◽  
...  

Author(s):  
Nahla Aljojo

<p>This paper examined the impact of a network attack on a congested transmission session. The research is motivated by the fact that the previous research community has neglected to evaluate security issues related to network congestion environments, and has instead concentrated on resolving congestion issues only. At any point in time, attackers can take advantage of the congestion problem, exploit the attack surface, and inject attack vectors. In order to circumvent this issue, a machine learning algorithm is trained to correlate attack vectors from the attack surface in a network congestion signals environment with the value of decisions over time in order to maximise expected attack vectors from the attack surface. Experimental scenario that dwell on transmission rate overwhelming transmission session, resulting in a standing queue was used. The experiment produced a dataset in which a TCP transmission through bursting transmission were capture. The data was acquired using a variety of experimental scenarios. Nave Bayes, and K-Nearest Neighbours prediction analyses demonstrate strong prediction performance. As a result, this study re-establishes the association between attack surface and vectors with network attack prediction.    </p>


2021 ◽  
Vol 13 (22) ◽  
pp. 4493
Author(s):  
Adrià Mallorquí ◽  
Agustín Zaballos ◽  
Alan Briones

The SHETLAND-NET research project aims to build an Internet of Things (IoT) telemetry service in Antarctica to automatize the data collection of permafrost research studies on interconnecting remote wireless sensor networks (WSNs) through near vertical incidence skywave (NVIS) long fat networks (LFN). The proposed architecture presents some properties from challenging networks that require the use of delay tolerant networking (DTN) opportunistic techniques that send the collected data during the night as a bulk data transfer whenever a link comes available. This process might result in network congestion and packet loss. This is a complex architecture that demands a thorough assessment of the solution’s viability and an analysis of the transport protocols in order to find the option which best suits the use case to achieve superior trustworthiness in network congestion situations. A heterogeneous layer-based model is used to measure and improve the trustworthiness of the service. The scenario and different transport protocols are modeled to be compared, and the system’s trustworthiness is assessed through simulations.


2021 ◽  
Author(s):  
Konstantinos Poularakis ◽  
Qiaofeng Qin ◽  
Franck Le ◽  
Sastry Kompella ◽  
Leandros Tassiulas

2021 ◽  
Vol E104.D (11) ◽  
pp. 2015-2018
Author(s):  
Zhentian WU ◽  
Feng YAN ◽  
Zhihua YANG ◽  
Jingya YANG

2021 ◽  
Author(s):  
Chang-Chi Wang ◽  
Ching-Po Cho ◽  
Tsung-Che Tsai ◽  
Chien-Che Hung

Author(s):  
D.K. Sharma ◽  
Nasir Abdul Jalil ◽  
R. Regin ◽  
S. Suman Rajest ◽  
Rama Krishna Tummala ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document