Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network traffic control

Known as: Network traffic 
In computer networking, network traffic control is the process of managing, controlling or reducing the network traffic, particularly Internet… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Review
2019
Review
2019
Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Event-triggered control has been recently proposed as an alternative to the more traditional periodic execution of control tasks… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
User-Generated Content has become very popular since new web services such as YouTube allow for the distribution of user-produced… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Botnets are now recognized as one of the most serious security threats. In contrast to previous malware, botnets have the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Model predictive control (MPC) is of interest because it is one of the few control design methods which preserves standard design… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We study the problem of media access control in the novel regime of sensor networks, where unique application behavior and tight… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract The paper discusses a real-time traffic-adaptive signal control system referred to as RHODES. The system takes as input… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of… Expand
  • figure 3
  • figure 8
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Recently the notion of self-similarity has been shown to apply to wide-area and local-area network traffic. In this paper we… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?