Sciweavers

967 search results - page 169 / 194
» COSY communication IP's
Sort
View
IWCMC
2010
ACM
14 years 1 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
KIVS
2001
Springer
14 years 1 months ago
Evaluating the GPRS Radio Interface for Different Quality of Service Profiles
This paper presents a discrete-event simulator for the General Packet Radio Service (GPRS) on the IP level. GPRS is a standard on packet data in GSM systems that will become commer...
Christoph Lindemann, Axel Thümmler
ICPPW
1999
IEEE
14 years 28 days ago
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System
A distributed WWW caching system based on Internet Cache Protocol (ICP) is a system where a cache of a single proxy server is shared by others. When a proxy server receives an HTT...
Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hid...
ANSS
2004
IEEE
14 years 12 days ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
APNOMS
2006
Springer
14 years 12 days ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi