Sciweavers

900 search results - page 85 / 180
» Controlling Inbound Traffic
Sort
View
ICCCN
2007
IEEE
14 years 3 months ago
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
Amey Shevtekar, Nirwan Ansari
CCS
2006
ACM
14 years 1 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 9 months ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous
ISCC
2006
IEEE
114views Communications» more  ISCC 2006»
14 years 3 months ago
On Cooperative Inter-Domain Path Computation
Inter-domain path computation, or the ability to compute end-to-end paths across multiple domains, is the next step toward wide deployment of a distributed control plane with supp...
Payam Torab, Bijan Jabbari, Qian Xu, Shujia Gong, ...
CAISE
2005
Springer
14 years 2 months ago
System Ontology and its role in Software Development
The research reported upon in this paper aims at reducing errors in both the requirements engineering and the system specification phase of software development, by means of system...
Jan L. G. Dietz