We study the performance of TCP in an internetwork consisting of both rate-controlled and non-rate-controlled segments. A commonexample of such an environment occurs when the end ...
Lampros Kalampoukas, Anujan Varma, K. K. Ramakrish...
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Abstract—Deploying home access points (AP) is hard. Untrained users typically purchase, install, and configure a home AP with very little awareness of wireless signal coverage a...
Justin Manweiler, Peter Franklin, Romit Roy Choudh...
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...