摘要:
The invention relates to a method for tracking discussions in social media. The present invention defines topics across data spreads in the web and collects data from the web, group pages talking on the same topics and pinpoints the key post, which have a high influence on the online discussions. The method of the present invention fits any document data which contains the following four features: an identifier, content, a date of publication, and references to other identified documents.
摘要:
A method for on demand matching between unused suppliers resources and consumers, comprising the steps of: implementing, on a computerized device (such as a server) with at least one processor, a resilient and trusted ad-hoc Peer-To-Peer (P2P) communication protocol across connected devices for sharing browsed content among an ad-hoc group of connected devices, using WiFi networking capabilities of the connected devices; optimizing, by the computerized device, internet consumption across browser based sessions, using standalone browsers, or browsers' modules utilized by native applications; replicating, by the computerized device, browser cache assets of participating devices, based on usage patterns and top internet destinations; refreshing, by the computerized device, shared cache assets in idle time for utilizing bandwidth across the ad hoc group; measuring, by the computerized device, internet experience optimization ratio over a predetermined period of time by monitoring the performance of devices participating in Home CDN vs. the devices that are not connected to a local network; measuring, by the computerized device, internet experience optimization ratio across multiple local networks setups.
摘要:
A system for early predicting of impending data overflow situations in data networks, comprising one or more sensors being networked computers that do not provide services, for collecting monitored data regarding network traffic volume from content providers to an Internet Service Provider (ISP) entering or exiting the ISP via peering autonomous systems connected to the ISP via physical links; one or more processors executing one or more deep learning models, being adapted to: identify over the data network being handovers alternative peering links, which are not inherent Private Network Interconnects (PNI) between the content providers and the ISP; determine static or dynamic threshold for dataflow anomaly associated with overflow; for each alternative handover, predict impending overflow situation by applying ML algorithms to the collected data that corresponds to the each alternative handover.
摘要:
A system for analyzing and clustering darknet traffic streams with word embeddings, comprising a data processing module which collects packets that are sent to non-existing IP addresses that belong to darknet's taps (blackholes) that are deployed over the internet; a port embedding module for performing port sequence embeddings by using a word embedding algorithm on the port sequences extracted from the data processing module while transforming the port sequences into a meaningful numerical feature vectors; a clustering module for performing temporal clustering of the feature vectors over time; and an alert logic and visualization module visualizes the data and provides alerts regarding a cluster that an analyst classified as malicious in the past.
摘要:
A system for increasing the flexibility of telecommunication infrastructures, comprising a plurality of mobile ad-hoc extensions for a cellular network, in the form of cellular base-stations, each carried and powered by a drone, to form a swarm of drones that carry the ad-hoc extensions; a control apparatus adapted to receive a demand for extensions of the cellular network; determine the size of the swarm, the optimal location of each drone in the swarm and the time period of staying in each location, for providing additional cellular coverage that fulfills the demand.
摘要:
An optimized limited-area WiFi network, comprising a plurality of Internet connectable devices, a wireless router for facilitating Internet connectivity, and a dynamically positionable signal coverage enhancer configured with an onboard processor, a signal coverage enhancing element, and mobile means, wherein the signal coverage enhancer is repositionable, by the mobile means in response to a command signal transmitted by the processor, to a determined location of the limited-area WiFi network that is sufficiently close to one or more of the devices, such that an amplified signal produced by the signal coverage enhancing element which amplifies a wireless signal transmitted by the router maintains uninterrupted Internet operation of the to one or more devices.
摘要:
A method for detecting malicious reprogramming of a Programmable Logic Controller (PLC) in a Superiority Control And Data Acquisition (SCADA) system, according to which a dedicated device is located on the communication network between the PLC and an engineering Workstation and the traffic between the PLC and the engineering Workstation is passively collected and checked using a TAP. An alert is generated upon detecting an unauthorized reprogramming in the checked traffic.