Sciweavers

5234 search results - page 41 / 1047
» Simulation of Computer Network Attacks
Sort
View
ANCS
2009
ACM
13 years 6 months ago
EINIC: an architecture for high bandwidth network I/O on multi-core processors
This paper proposes a new server architecture EINIC (Enhanced Integrated NIC) for multi-core processors to tackle the mismatch between network speed and host computational capacit...
Guangdeng Liao, Laxmi N. Bhuyan, Danhua Guo, Steve...
CCS
2005
ACM
14 years 2 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
DSN
2004
IEEE
14 years 24 days ago
A Defense-Centric Taxonomy Based on Attack Manifestations
Many classifications of attacks have been tendered, often in taxonomic form. A common basis of these taxonomies is that they have been framed from the perspective of an attacker
Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan
COMPSAC
2007
IEEE
14 years 3 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong