|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
|
Xiao Huang, Xiaofeng Wang, Yuan Liu and Qingsong Xue
Traffic replay can effectively improve the fidelity of network emulation and can support emerging network verification and network security evaluation. A distributed traffic replay framework for network emulation, named DTRF, is designed for large-scale ...
ver más
|
|
|
|
|
|
|
Zhihai Zhuo, Jintao Huang, Wanyu Lu and Xiangyang Lu
In modern warfare, achieving strikes against military targets commonly involves utilizing methods such as fire coverage and missile precision guidance. While effective, fire coverage requires significant ammunition support, and missiles can be costly. Th...
ver más
|
|
|
|
|
|
|
Siyu Qi, Minxue He, Raymond Hoang, Yu Zhou, Peyman Namadi, Bradley Tom, Prabhjot Sandhu, Zhaojun Bai, Francis Chung, Zhi Ding, Jamie Anderson, Dong Min Roh and Vincent Huynh
Salinity management in estuarine systems is crucial for developing effective water-management strategies to maintain compliance and understand the impact of salt intrusion on water quality and availability. Understanding the temporal and spatial variatio...
ver más
|
|
|
|
|
|
|
Ernesto Cadena Muñoz, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno and Mónica Espinosa Buitrago
The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature, so...
ver más
|
|
|
|
|
|
|
Rehna Batool, Nargis Bibi, Nazeer Muhammad and Samah Alhazmi
Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time by avoiding any...
ver más
|
|
|
|
|
|
|
Nafi Ahmad, Abdul Wahab, John Schormans and Ali Adib Arnab
In this paper, utilising real-internet traffic data, we modified a popular network emulator to better imitate real network traffic and studied its subjective and objective implications on QoE for cloud-gaming apps. Subjective QoE evaluation was then used...
ver más
|
|
|
|
|
|
|
Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by provi...
ver más
|
|
|
|
|
|
|
Poh Soon JosephNg, Pin Sen BrandonChan and Koo Yuen Phan
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intell...
ver más
|
|
|
|
|
|
|
Indrakshi Dey and Nicola Marchetti
In this paper, we develop a tractable mathematical model and an emulation framework for communicating information through water using acoustic signals. Water is considered one of the most complex media to model due to its vastness and variety of characte...
ver más
|
|
|
|