Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
In this paper we present an experimental study of several maximum flow algorithms in the context of unbalanced bipartite networks. Our experiments are motivated by a real world pr...
Cosmin Silvestru Negruseri, Mircea Bogdan Pasoi, B...
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...