Sciweavers

967 search results - page 98 / 194
» COSY communication IP's
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
ICMCS
1999
IEEE
89views Multimedia» more  ICMCS 1999»
14 years 1 months ago
A Lightweight Protocol for Interconnecting Heterogeneous Devices in Dynamic Environments
In the near future people will be able to move freely and still have seamless network and Internet connectivity. One implication of this new style of interaction is an increased d...
Kevin C. Almeroth, Katia Obraczka, Dante DeLucia
ICC
2007
IEEE
239views Communications» more  ICC 2007»
14 years 3 months ago
Measuring WCDMA and HSDPA Delay Characteristics with QoSMeT
—Quality of Service (QoS) is becoming increasingly important with the rise of multimedia applications (e.g., voice over IP (VoIP), video conferencing, online gaming, and Internet...
Jarmo Prokkola, Mikko Hanski, Marko Jurvansuu, Mil...
NOSSDAV
2010
Springer
14 years 1 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
SIGCOMM
2006
ACM
14 years 2 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster