scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Patent
30 Apr 2015
TL;DR: In this paper, the authors present a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT).
Abstract: The invention is a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT). APTs are very sophisticated attacks and incorporate advanced methods for evading current security mechanisms. Therefore, the present invention uses an innovative social network honeypot.

13 citations

Book ChapterDOI
04 Sep 2000
TL;DR: This paper outlines an architecture for OLAP-based preprocessing that enables interactive and iterative processing of data and combines database technology with classical data mining systems using an OLAP engine as interface.
Abstract: The application of data mining algorithms needs a goal-oriented pre-processing of the data. In practical applications the preprocessing task is very time consuming and has an important influence on the quality of the generated models. In this paper we describe a new approach for data preprocessing. Combining database technology with classical data mining systems using an OLAP engine as interface we outline an architecture for OLAP-based preprocessing that enables interactive and iterative processing of data. This high level of interaction between human and database system enables efficient understanding and preparing of data for building scalable data mining applications. Our case study taken from the data-intensive telecommunication domain applies the proposed methodology for deriving user communication profiles. These user profiles are given as input to data mining algorithms for clustering cutomers with similar behavior.

13 citations

Proceedings ArticleDOI
L. Giehmann1, Andreas Gladisch, N. Hanik, J. Rudolph, O. Ziemann 
22 Feb 1998
TL;DR: In this article, the feasibility of CDMA for transport of OAM-signals with a bandwidth up to l 0-kbit/s per optical carrier in transparent optical networks with minimised distortion of the high speed data stream.
Abstract: Summary form only given. The operation, administration, and maintenance (OAM) of a transport network require the generation, transmission, and detection of OAM signals that are related to each network layer. In the modelled system Gold codes have been applied for transport of the OAM-signals at channels, which have been modulated externally (by Mach-Zehnder modulators) at different modulation levels in order to characterize the influence of the modulation depth. The simulation has shown the feasibility of CDMA for transport of OAM-signals with a bandwidth up to l0-kbit/s per optical carrier in transparent optical networks with minimised distortion of the high speed data stream.

13 citations

Patent
11 May 2011
TL;DR: In this paper, a touch-sensitive reactivation icon is drawn with a touching gesture in a previously locked region of a touch screen, where the release of display functionality is activated.
Abstract: The method involves displaying a touch-sensitive reactivation icon (8) in a visually defined field of a screen. The reactivation icon is drawn with a touching gesture in a previously locked region of a touch screen (7), where the release of display functionality is activated. The release of the reactivation icons is activated by the functionalities retrieved on the screen. An independent claim is also included for a mobile terminal, particularly a mobile phone.

13 citations

Proceedings ArticleDOI
01 Dec 2010
TL;DR: How to leverage network virtualization to improve debugging ability by replicating and cloning production networks and then applying the changes to the cloned network in a safe fashion is shown.
Abstract: Today diagnosing problems, deploying new services, testing protocol interactions, or validating network configurations are still largely unsolved problems for both enterprise and Internet Service Provider (ISP) networks. Due to the intrinsically distributed nature of network state, frequent timing dependencies, and sources of non-determinism involved, any change may introduce undesired effects-even the impact of a simple configuration change can be hard to predict. In this paper we show how to leverage network virtualization to improve our debugging ability: By replicating and cloning production networks and then applying the changes to the cloned network in a safe fashion. Mirror VNets thus enable troubleshooting as well as safe upgrades to both software and configuration.

13 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897