University American College Skopje

Displaying 1-5 of 5 results

  • White Papers // Jun 2013

    Performance Evaluation of Classification Techniques used for Data Theft Detection

    One of the challenges in data theft detection is the difficulty to distinguish copy operation from other type of access operations. Existing work in this area focuses on the stochastic model of file-system behavior to identify emergent patterns in MAC timestamps unique to copying. Such an approach produces lot of...

    Provided By University American College Skopje

  • White Papers // Jun 2012

    Do Cloud Security Announcements Affect Firm Valuation?

    Recent years have witnessed unprecedented growth in adoption and offerings of cloud computing services. Security and availability risks have risen to become one of the biggest challenges and concerns for not only businesses that are transitioning into the cloud but also companies offering the cloud services. The focus of this...

    Provided By University American College Skopje

  • White Papers // Sep 2010

    Loss Differentiation Algorithms Vs. Congestion Control Schemes: Dynamics and Performance

    This paper carefully analyzes the behavior of different congestion control schemes when used in combination with Loss Differentiation Algorithm. Three types of congestion schemes are discussed: delay-based, bandwidth estimation and AIMD, with one TCP variant representing each congestion scheme. The authors simulated two network scenarios with diverse link and traffic...

    Provided By University American College Skopje

  • White Papers // Jun 2010

    Iterative System for Simulation of E2E Transport Protocols in Heterogeneous Networks

    The Internet is characterized by the ever-increasing number of connections, nodes and places of presence, kinds of topologies, transmission media technologies, the yearly growth in user communities by magnitudes, the variety and the potential of innovative applications, combined with the economic, social, cultural and political ramifications. While constantly being measured...

    Provided By University American College Skopje

  • White Papers // Sep 2009

    The Performance of a Packet Pairing TCP Modification in Networks With Lossy Links

    In general, communication protocols, starting from the network layer, should be independent of the underlying transmission media. The same principle applies to the existing Internet architecture based on the TCP/IP protocol suite that was designed to run over wired media four decades ago. However, the advent of the wireless network...

    Provided By University American College Skopje

  • White Papers // Jun 2012

    Do Cloud Security Announcements Affect Firm Valuation?

    Recent years have witnessed unprecedented growth in adoption and offerings of cloud computing services. Security and availability risks have risen to become one of the biggest challenges and concerns for not only businesses that are transitioning into the cloud but also companies offering the cloud services. The focus of this...

    Provided By University American College Skopje

  • White Papers // Sep 2010

    Loss Differentiation Algorithms Vs. Congestion Control Schemes: Dynamics and Performance

    This paper carefully analyzes the behavior of different congestion control schemes when used in combination with Loss Differentiation Algorithm. Three types of congestion schemes are discussed: delay-based, bandwidth estimation and AIMD, with one TCP variant representing each congestion scheme. The authors simulated two network scenarios with diverse link and traffic...

    Provided By University American College Skopje

  • White Papers // Jun 2010

    Iterative System for Simulation of E2E Transport Protocols in Heterogeneous Networks

    The Internet is characterized by the ever-increasing number of connections, nodes and places of presence, kinds of topologies, transmission media technologies, the yearly growth in user communities by magnitudes, the variety and the potential of innovative applications, combined with the economic, social, cultural and political ramifications. While constantly being measured...

    Provided By University American College Skopje

  • White Papers // Sep 2009

    The Performance of a Packet Pairing TCP Modification in Networks With Lossy Links

    In general, communication protocols, starting from the network layer, should be independent of the underlying transmission media. The same principle applies to the existing Internet architecture based on the TCP/IP protocol suite that was designed to run over wired media four decades ago. However, the advent of the wireless network...

    Provided By University American College Skopje

  • White Papers // Jun 2013

    Performance Evaluation of Classification Techniques used for Data Theft Detection

    One of the challenges in data theft detection is the difficulty to distinguish copy operation from other type of access operations. Existing work in this area focuses on the stochastic model of file-system behavior to identify emergent patterns in MAC timestamps unique to copying. Such an approach produces lot of...

    Provided By University American College Skopje