- Eklemek veya çıkarmak istediğiniz kriterleriniz için 'Dahil' / 'Hariç' seçeneğini kullanabilirsiniz. Sorgu satırları birbirine 'VE' bağlacı ile bağlıdır. - İptal tuşuna basarak normal aramaya dönebilirsiniz.
A flow is said to be asymmetrically routed if its packets follow separate paths for forward and reverse directions. Routing asymmetry leads to problems in flow identification, policy enforcement, quota management, traffic shaping etc. in DPI systems. There are two existing approaches to battle routing asymmetry: clustering and state sharing. The latter fails with stateless traffic, while clustering leads to large traffic overhead. We propose the Hybrid Asymmetric Traffic Classifier (HATC) method that merges the best aspects of the two existing methods. HATC is able to handle all types of asymm ...Daha fazlası
YUMUŞAK, Semih | ARAS, Rıza Emre | UYSAL, Elif | DOĞDU, Erdoğan | KODAZ, Halife | ÖZTOPRAK, Kasım
We present the project SpEnD, a complete SPARQL endpoint discovery and analysis portal. In a previous study, the SPARQL endpoint discovery and analysis steps of the SpEnD system were explained in detail. In the SpEnD portal, the SPARQL endpoints are extracted from the web by using web crawling techniques, monitored and analyzed by live querying the endpoints systematically. After many sustainability improvements in the SpEnD project, the SpEnD system is now online as a portal. SpEnD portal currently serves 1487 SPARQL endpoints, out of which 911 endpoints are uniquely found by SpEnD only when ...Daha fazlası
Network Security is one of the most critical issues of establishments like universities, govermental and private institutions which have significant role on development and security of a state. These establishments use internet to share and keep official information, and to make their institutive operations. A cyber attack that targetted such establishments networks may cause a great loss. Therefore, networks of these establishments ought to protect on a high level security. In this paper, a system is offered which is able to investigate networks of institutions and ranking their network by pr ...Daha fazlası
Trolls in social media are 'malicious' users trying to propagate an opinion or distort the general perceptions. Identifying trolls in social media is a task of interest for many big data applications since data cannot be analyzed effectively without eliminating such users from the crowd. In this paper, we present a solution for troll detection and also the results of measuring terror awareness among social media users. We used Twitter platform only, and applied several machine learning techniques and big data methodologies. For machine learning we used k-Nearest Neighbour (kNN), Naive Bayes, a ...Daha fazlası
Publish/subscribe communication systems, where nodes subscribe to many different topics of interest, are becoming increasingly more common in application domains such as social networks, Internet of Things, etc. Designing overlay networks that connect the nodes subscribed to each distinct topic is hence a fundamental problem in these systems. For scalability and efficiency, it is important to keep the maximum node degree of the overlay in the publish/subscribe system low. Ideally one would like to be able not only to keep the maximum node degree of the overlay low, but also to ensure that the ...Daha fazlası
6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve cerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.