Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,356,119 papers from all fields of science
Search
Sign In
Create Free Account
Traffic analysis
Known as:
Traffic flow security
, Traffic-flow security
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
Alice and Bob
Anonymous Internet banking
Anonymous web browsing
BitTorrent
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Cost-Efficient Sensory Data Transmission in Heterogeneous Software-Defined Vehicular Networks
Zongjian He
,
Daqiang Zhang
,
Junbin Liang
IEEE Sensors Journal
2016
Corpus ID: 23119200
Sensing and networking have been regarded as key enabling technologies of future smart vehicles. Sensing allows vehicles to be…
Expand
2010
2010
Increasing base-station anonymity in wireless sensor networks through adaptive sampling rate
Uday Acharya
,
M. Younis
IEEE International Conference on Wireless and…
2010
Corpus ID: 17182433
Highly Cited
2008
Highly Cited
2008
Location privacy and anonymity preserving routing for wireless sensor networks
Alireza A. Nezhad
,
A. Miri
,
D. Makrakis
Comput. Networks
2008
Corpus ID: 27638042
Highly Cited
2007
Highly Cited
2007
Bounded-Latency Alerts in Vehicular Networks
Rahul Mangharam
,
Raj Rajkumar
,
Mark Hamilton
,
P. Mudalige
,
Fan Bai
Mobile Networking for Vehicular Environments
2007
Corpus ID: 14269626
Vehicle-to-vehicle communication protocols may be broadly classified into in three categories; bounded-delay safety alerts…
Expand
Highly Cited
2006
Highly Cited
2006
Robust traffic matrix estimation with imperfect information: making use of multiple data sources
Qi Zhao
,
Zihui Ge
,
Jia Wang
,
Jun Xu
SIGMETRICS '06/Performance '06
2006
Corpus ID: 16173548
Estimation of traffic matrices, which provide critical input for network capacity planning and traffic engineering, has recently…
Expand
Highly Cited
2005
Highly Cited
2005
A Quality of Service Architecture for IEEE 802.16 Standards
Hamed Alavi
,
Mona Mojdeh
,
Nasser Yazdani
Asia-Pacific Conference on Communications
2005
Corpus ID: 35610848
A worldwide demand for a high-speed, always-on broadband wireless system across residential and business regions is emerging…
Expand
2004
2004
Traffic Grooming Under a Sliding Scheduled Traffic Model in WDM Optical Networks
Bin Wang
,
Tianjian Li
,
Xubin Luo
,
Yuqi Fan
2004
Corpus ID: 16970830
Work on traffic grooming in mesh networks considered several traffic models: static traffic model, dynamic random traffic model…
Expand
2002
2002
Performance of received power and traffic-driven handover algorithms in urban cellular networks
R. Verdone
,
A. Zanella
IEEE wireless communications
2002
Corpus ID: 45652455
This article presents an investigation of the handover algorithms suitable for implementation in urban mobile cellular networks…
Expand
Highly Cited
2001
Highly Cited
2001
Multiplicative multifractal modelling of long‐range‐dependent network traffic
Jianbo Gao
,
I. Rubin
International Journal of Communication Systems
2001
Corpus ID: 10172709
We present a multiplicative multifractal process to model traffic which exhibits long‐range dependence. Using traffic trace data…
Expand
Highly Cited
1998
Highly Cited
1998
On the optimal placement of wavelength converters in wavelength-routed networks
S. Subramaniam
,
M. Azizoglu
,
Arun Kumar Somani
Proceedings. IEEE INFOCOM '98, the Conference on…
1998
Corpus ID: 1429398
We consider the problem of optimally placing a given number of wavelength converters on a path to minimize the call blocking…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE