2006
DOI: 10.1109/tifs.2006.879291
|View full text |Cite
|
Sign up to set email alerts
|

Estimation of Message Source and Destination From Network Intercepts

Abstract: Abstract-Index Terms-Network tomography and surveillance, detection and identification of anomalous events, channel and network models, data acquisition and sensor models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Nevertheless, although the source-dependent model more accurately reflects how routing is performed in actual communication systems, there are scenarios where a single transition matrix estimate is preferable. For example, a more holistic characterization of network routing is valuable if one is interested in predicting the route between a source and destination that was not previously observed, or if one is interested in predicting the endpoints of a route given only the activated internal routers [12].…”
Section: Discussion and Ongoing Researchmentioning
confidence: 99%
See 3 more Smart Citations
“…Nevertheless, although the source-dependent model more accurately reflects how routing is performed in actual communication systems, there are scenarios where a single transition matrix estimate is preferable. For example, a more holistic characterization of network routing is valuable if one is interested in predicting the route between a source and destination that was not previously observed, or if one is interested in predicting the endpoints of a route given only the activated internal routers [12].…”
Section: Discussion and Ongoing Researchmentioning
confidence: 99%
“…This procedure always produces a feasible reconstruction. The parameter estimates produced by the EM algorithm may be useful for other tasks such as guiding an expert to alternative reconstructions by assigning likelihoods to different permutations, or predicting unobserved paths through the network as in [12]. One could also analyze properties of an ensemble of solutions obtained by running the EM algorithm from different initializations, and then posit a new set of experiments to be conducted based on this analysis.…”
Section: Discussion and Ongoing Researchmentioning
confidence: 99%
See 2 more Smart Citations