|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
|
Xiao Huang, Xiaofeng Wang, Yuan Liu and Qingsong Xue
Traffic replay can effectively improve the fidelity of network emulation and can support emerging network verification and network security evaluation. A distributed traffic replay framework for network emulation, named DTRF, is designed for large-scale ...
ver más
|
|
|
|
|
|
|
Zhihai Zhuo, Jintao Huang, Wanyu Lu and Xiangyang Lu
In modern warfare, achieving strikes against military targets commonly involves utilizing methods such as fire coverage and missile precision guidance. While effective, fire coverage requires significant ammunition support, and missiles can be costly. Th...
ver más
|
|
|
|
|
|
|
Nafi Ahmad, Abdul Wahab, John Schormans and Ali Adib Arnab
In this paper, utilising real-internet traffic data, we modified a popular network emulator to better imitate real network traffic and studied its subjective and objective implications on QoE for cloud-gaming apps. Subjective QoE evaluation was then used...
ver más
|
|
|
|
|
|
|
Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by provi...
ver más
|
|
|
|
|
|
|
Eirini Liotou, Dionysis Xenakis, Vasiliki Georgara, Georgios Kourouniotis and Lazaros Merakos
Dynamic Adaptive Streaming over HTTP (DASH) has prevailed as the dominant way of video transmission over the Internet. This technology is based on receiving small sequential video segments from a server. However, one challenge that has not been adequatel...
ver más
|
|
|
|
|
|
|
Ernesto Cadena Muñoz, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno and Mónica Espinosa Buitrago
The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature, so...
ver más
|
|
|
|
|
|
|
Rehna Batool, Nargis Bibi, Nazeer Muhammad and Samah Alhazmi
Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time by avoiding any...
ver más
|
|
|
|
|
|
|
Indrakshi Dey and Nicola Marchetti
In this paper, we develop a tractable mathematical model and an emulation framework for communicating information through water using acoustic signals. Water is considered one of the most complex media to model due to its vastness and variety of characte...
ver más
|
|
|
|
|
|
|
Leonardo Alberro, Felipe Velázquez, Sara Azpiroz, Eduardo Grampin and Matías Richart
Massive scale data centers (MSDC) have become a key component of current content-centric Internet architecture. With scales of up to hundreds of thousands servers, conveying traffic inside these infrastructures requires much greater connectivity resource...
ver más
|
|
|
|