Institution
Deutsche Telekom
Company•Welwyn Garden City, United Kingdom•
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.
Topics: Telecommunications network, Terminal (electronics), The Internet, Radio access network, Network packet
Papers published on a yearly basis
Papers
More filters
•
30 Apr 2015TL;DR: In this paper, the authors present a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT).
Abstract: The invention is a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT). APTs are very sophisticated attacks and incorporate advanced methods for evading current security mechanisms. Therefore, the present invention uses an innovative social network honeypot.
13 citations
••
04 Sep 2000TL;DR: This paper outlines an architecture for OLAP-based preprocessing that enables interactive and iterative processing of data and combines database technology with classical data mining systems using an OLAP engine as interface.
Abstract: The application of data mining algorithms needs a goal-oriented pre-processing of the data. In practical applications the preprocessing task is very time consuming and has an important influence on the quality of the generated models. In this paper we describe a new approach for data preprocessing. Combining database technology with classical data mining systems using an OLAP engine as interface we outline an architecture for OLAP-based preprocessing that enables interactive and iterative processing of data. This high level of interaction between human and database system enables efficient understanding and preparing of data for building scalable data mining applications. Our case study taken from the data-intensive telecommunication domain applies the proposed methodology for deriving user communication profiles. These user profiles are given as input to data mining algorithms for clustering cutomers with similar behavior.
13 citations
••
22 Feb 1998TL;DR: In this article, the feasibility of CDMA for transport of OAM-signals with a bandwidth up to l 0-kbit/s per optical carrier in transparent optical networks with minimised distortion of the high speed data stream.
Abstract: Summary form only given. The operation, administration, and maintenance (OAM) of a transport network require the generation, transmission, and detection of OAM signals that are related to each network layer. In the modelled system Gold codes have been applied for transport of the OAM-signals at channels, which have been modulated externally (by Mach-Zehnder modulators) at different modulation levels in order to characterize the influence of the modulation depth. The simulation has shown the feasibility of CDMA for transport of OAM-signals with a bandwidth up to l0-kbit/s per optical carrier in transparent optical networks with minimised distortion of the high speed data stream.
13 citations
•
11 May 2011TL;DR: In this paper, a touch-sensitive reactivation icon is drawn with a touching gesture in a previously locked region of a touch screen, where the release of display functionality is activated.
Abstract: The method involves displaying a touch-sensitive reactivation icon (8) in a visually defined field of a screen. The reactivation icon is drawn with a touching gesture in a previously locked region of a touch screen (7), where the release of display functionality is activated. The release of the reactivation icons is activated by the functionalities retrieved on the screen. An independent claim is also included for a mobile terminal, particularly a mobile phone.
13 citations
••
01 Dec 2010TL;DR: How to leverage network virtualization to improve debugging ability by replicating and cloning production networks and then applying the changes to the cloned network in a safe fashion is shown.
Abstract: Today diagnosing problems, deploying new services, testing protocol interactions, or validating network configurations are still largely unsolved problems for both enterprise and Internet Service Provider (ISP) networks. Due to the intrinsically distributed nature of network state, frequent timing dependencies, and sources of non-determinism involved, any change may introduce undesired effects-even the impact of a simple configuration change can be hard to predict. In this paper we show how to leverage network virtualization to improve our debugging ability: By replicating and cloning production networks and then applying the changes to the cloned network in a safe fashion. Mirror VNets thus enable troubleshooting as well as safe upgrades to both software and configuration.
13 citations
Authors
Showing all 3475 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jörg Müller | 67 | 407 | 15282 |
Anja Feldmann | 67 | 340 | 17422 |
Yuval Elovici | 62 | 544 | 14451 |
Lior Rokach | 55 | 357 | 19989 |
Pan Hui | 52 | 468 | 17724 |
Hartmut G. Roskos | 50 | 434 | 9643 |
Wolfgang Haase | 50 | 624 | 11634 |
Shlomi Dolev | 48 | 516 | 10435 |
Jean-Pierre Seifert | 45 | 298 | 7516 |
Stefan Schmid | 45 | 561 | 9088 |
Fabian Schneider | 44 | 164 | 7437 |
Karsten Buse | 43 | 394 | 7774 |
Tansu Alpcan | 43 | 293 | 7840 |
Florian Metze | 42 | 318 | 7148 |
Christian Bauckhage | 42 | 285 | 8313 |