—Peer-to-Peer (P2P) based live video streaming system has emerged as a promising solution for the Internet video streaming applications, partly evident from commercial deployment...
Bo Li, Gabriel Yik Keung, Susu Xie, Fangming Liu, ...
—The Internet has significantly evolved in the number and variety of applications. Network operators need mechanisms to constantly monitor and study these applications. Given mo...
Myungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompe...
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...