{"title":"Detection of NAT64/DNS64 by SRV Records: Detection Using Global DNS Tree in the World Beyond Plain-Text DNS","authors":"Martin Hunek, Z. Plíva","doi":"10.1007/978-3-030-50719-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-50719-0_3","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"20 1","pages":"27-40"},"PeriodicalIF":0.0,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91362719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Block Segmentation Method of the Licklider Transmission Protocol","authors":"R. Lent","doi":"10.1007/978-3-030-50719-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-50719-0_2","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"14-26"},"PeriodicalIF":0.0,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76379910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection Efficiency Improvement in Multi-component Anti-spam Systems","authors":"T. Sochor","doi":"10.1007/978-3-030-50719-0_8","DOIUrl":"https://doi.org/10.1007/978-3-030-50719-0_8","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"38 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78701043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peer-to-Peer Transfers for Crowd Monitoring - A Reality Check","authors":"C. Groba, A. Schill","doi":"10.1007/978-3-030-50719-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-50719-0_6","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"133 1","pages":"64-76"},"PeriodicalIF":0.0,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86240593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transient Solution of a Heterogeneous Queuing System with Balking and Retention of Reneging Customers","authors":"Rakesh Kumar, Sapana Sharma, V. Rykov","doi":"10.1007/978-3-030-21952-9_25","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_25","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"330-346"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72810551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konrad Polys, K. Grochla, Artur Frankiewicz, Michal Gorawski
{"title":"Accuracy of UWB Location Tracking Devices When on the Move","authors":"Konrad Polys, K. Grochla, Artur Frankiewicz, Michal Gorawski","doi":"10.1007/978-3-030-21952-9_18","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_18","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"50 1","pages":"233-241"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90039865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Lysenko, K. Bobrovnikova, O. Savenko, A. Kryshchuk
{"title":"BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks","authors":"S. Lysenko, K. Bobrovnikova, O. Savenko, A. Kryshchuk","doi":"10.1007/978-3-030-21952-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_10","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"20 1","pages":"127-143"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81058693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Voice Traffic Load Characteristics","authors":"Zagroz Aziz, R. Bestak","doi":"10.1007/978-3-030-21952-9_15","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_15","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"65 1","pages":"193-207"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73964257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Attack Detection by Using Neural Network Approaches: Shallow Neural Network, Deep Neural Network and AutoEncoder","authors":"S. Ustebay, Zeynep Turgut, M. Aydin","doi":"10.1007/978-3-030-21952-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_11","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"36 1","pages":"144-155"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77438108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal Characteristics of CodeSys Programmed Raspberry Pi and Beaglebone Black Embedded Devices","authors":"Jacek Stój, Ireneusz Smolka","doi":"10.1007/978-3-030-21952-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_12","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"48 1","pages":"156-167"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82367704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}