Sciweavers

1134 search results - page 191 / 227
» On Scalability and Modularisation in the Modelling of Networ...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
RAID
2005
Springer
14 years 1 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
SIGCOMM
2009
ACM
14 years 2 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
VLDB
1995
ACM
130views Database» more  VLDB 1995»
13 years 11 months ago
Improving Performance in Replicated Databases through Relaxed Coherency
Applications in finance and telecommunications (intelligent network, network management, mobile computing) cause renewed interest in distributed and replicated data management. Si...
Rainer Gallersdörfer, Matthias Nicola
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi