Sciweavers

265 search results - page 36 / 53
» Security Patterns for Voice over IP Networks
Sort
View
SIGCOMM
2006
ACM
14 years 4 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
ICC
2009
IEEE
105views Communications» more  ICC 2009»
14 years 5 months ago
Decentralized Control and Optimization of Networks with QoS-Constrained Services
—We consider data networks in which real-time/near real-time applications require not only successful transmission of packets from source to destination, but also specific end-to...
Iraj Saniee
ADHOC
2007
131views more  ADHOC 2007»
13 years 10 months ago
Perceptive admission control for wireless network quality of service
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
WWW
2011
ACM
13 years 5 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...