Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Network Based Application Recognition"'
Publikováno v:
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
Fingerprint recognition of network equipment is closely related to network security. Router equipment, as one of the critical device in network, is the key object of study on the recognition of network equipment. Due to the biggest market shares of C
Publikováno v:
2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES).
This paper aims to examine the issues related to the Traditional Cisco Laboratory system in particular and evaluate the issues regarding current solutions. This paper reports on an efficient and economical Laboratory system which can be accessed wire
Autor:
Mario da Silva
Publikováno v:
Multimedia Communications and Networking ISBN: 9780429065163
Multimedia Communications and Networking
Multimedia Communications and Networking
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::784d539c31c0abb0e09eb904d98c8705
https://doi.org/10.1201/b11715-18
https://doi.org/10.1201/b11715-18
Autor:
Jing Xin, Jia Pin Xu
Publikováno v:
Applied Mechanics and Materials. :1473-1478
At present, the recognition ability of the service recognition technique is limited to single installation. It leads to recognition error easily and it's dangerous for the Next Generation Networks which depend on service recognition and control. This
Autor:
Akram Al-Rawi, Azzedine Lansari
Publikováno v:
Issues in Informing Science and Information Technology, Vol 4, Pp 739-747 (2007)
Introduction Cisco Networking Academy (CNA) is widely used in high schools, colleges, and universities all over the world. The Cisco Networking Academy Programs provide critical skills needed by students to work in the IT field. The program offers We
Publikováno v:
HPCA
As chip designs penetrate further into the dark silicon era, innovative techniques are much needed to power off idle or under-utilized system components while having minimal impact on performance. On-chip network routers are potentially good targets
Publikováno v:
Proceedings 2015 Workshop on Security of Emerging Networking Technologies.
Network censorship and surveillance generally in- volves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users' traffic, often using powerful networking devices, e.g. routers capable of performing Deep Packet
Publikováno v:
ACM SIGCOMM Computer Communication Review. 33:127-135
Virtual routers are software entities, i.e. user space processes, emulating IP routers on one or several (Linux) computers. Virtual routers can be used for both networking research and education. In contrast to simulation, virtual routers process pac
Autor:
G. Lawton
Publikováno v:
Computer. 42:15-17
As networking has become more complex, routers-which historically have been very basic pieces of equipment-are adding functions formerly found in other devices. In addition, new approaches and alternatives are emerging.
Autor:
Huaibin Wang, Boting Chen
Publikováno v:
MSN
In the case of network applications become more common and computer network security issues become more prominent, intercepting and analyzing network packets is important. However, network environment traffic is large. How to intercept and analyze ne