Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security.
Sajimon AbrahamPaulose Sojan LalPublished in: PAISI (2010)
Keyphrases
- network traffic
- moving objects
- network layer
- road segments
- traffic analysis
- internet service providers
- network security
- network management
- intrusion detection
- network monitoring
- road network
- trajectory data
- spatio temporal
- internet traffic
- security threats
- trajectories of moving objects
- denial of service attacks
- similarity measure
- movement patterns
- network resources
- computer networks
- image sequences
- origin destination
- traffic data
- traffic load
- moving object databases
- congestion control
- security measures
- spatial networks
- mesh network
- traffic patterns
- moving object trajectories
- traffic conditions
- telecommunication networks
- transportation networks
- ip addresses
- optical flow
- information security
- wireless sensor networks
- peer to peer
- network devices
- vehicle trajectory
- cyber attacks
- malicious traffic
- continuously moving
- moving objects databases
- access control
- anomaly detection
- network structure
- communication networks
- security policies
- security issues
- ddos attacks
- ip address