This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
— In recent years, the wireless mesh network (WMN) attracts the interest of many people as a new broadband Internet access technology. However, increasing throughput is still an ...
— VoIP has widely been addressed as the technology that will change the Telecommunication model opening the path for convergence. Still today this revolution is far from being co...
Robert Birke, Marco Mellia, Michael Petracca, Dari...