Sciweavers

2562 search results - page 225 / 513
» An Internet without the Internet protocol
Sort
View
ICON
2007
IEEE
15 years 10 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CEAS
2007
Springer
15 years 10 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
DSN
2006
IEEE
15 years 10 months ago
Improving BGP Convergence Delay for Large-Scale Failures
Border Gateway Protocol (BGP) is the standard routing protocol used in the Internet for routing packets between the Autonomous Systems (ASes). It is known that BGP can take hundre...
Amit Sahoo, Krishna Kant, Prasant Mohapatra
SIGCOMM
2006
ACM
15 years 10 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
AAAIDEA
2005
IEEE
15 years 10 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings