Sciweavers

9316 search results - page 7 / 1864
» Analysis of traceback techniques
Sort
View
GLOBECOM
2008
IEEE
14 years 1 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan

Publication
167views
13 years 7 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
ICDCS
2008
IEEE
14 years 1 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
VLSID
2006
IEEE
170views VLSI» more  VLSID 2006»
14 years 7 months ago
On the Implementation of a Low-Power IEEE 802.11a Compliant Viterbi Decoder
This article describes a standard cell based novel implementation of a low-power Viterbi Decoder (VD) targeted for the IEEE 802.11a Wireless LAN system. Multiple clock rates have ...
Koushik Maharatna, Alfonso Troya, Milos Krstic, Ec...
ICDAR
2009
IEEE
13 years 5 months ago
A Distance-Based Technique for Non-Manhattan Layout Analysis
Layout analysis is a fundamental step in automatic document processing. Many different techniques have been proposed in literature to perform this task. These are broadly divided ...
Stefano Ferilli, Marenglen Biba, Floriana Esposito...