Sciweavers

6229 search results - page 1122 / 1246
» Models of Computation for Networks on Chip
Sort
View
LCN
2007
IEEE
14 years 3 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
MIDDLEWARE
2007
Springer
14 years 3 months ago
Hybrid Dissemination: Adding Determinism to Probabilistic Multicasting in Large-Scale P2P Systems
Abstract. Epidemic protocols have demonstrated remarkable scalability and robustness in disseminating information on internet-scale, dynamic P2P systems. However, popular instances...
Spyros Voulgaris, Maarten van Steen
RAID
2007
Springer
14 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
BROADNETS
2006
IEEE
14 years 3 months ago
Optimizing IP Multicast through Delayed Multicast Tree Pruning
This paper studies the system parameters that affect the total cost of managing the multicast group on a router. A Petri net model is first proposed to describe the states and tra...
Yongjun Li, Wenhui Zhou, James Zijun Wang, Deyu Qi
« Prev « First page 1122 / 1246 Last » Next »