Sciweavers

77 search results - page 14 / 16
» Peer-to-Peer Traffic: From Measurements to Analysis
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...
ACSAC
2002
IEEE
14 years 12 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
TMC
2008
219views more  TMC 2008»
13 years 6 months ago
COACS: A Cooperative and Adaptive Caching System for MANETs
This paper introduces a cooperation-based database caching system for Mobile Ad Hoc Networks (MANETs). The heart of the system is the nodes that cache submitted queries. The querie...
Hassan Artail, Haïdar Safa, Khaleel W. Mersha...
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...