In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
In this paper we present a performance study of memory reference behavior in network protocol processing, using an Internet-based protocol stack implemented in the x-kernel runnin...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
—A method to quantify the probabilistic controller taskload inherent to maintaining aircraft adherence to 4-D trajectories within flow corridors is presented. Taskload is here d...
Vlad Popescu, John-Paul Clarke, Karen M. Feigh, Er...
—The IEEE 802.15.4 standard has no provisions for rate sensitive applications because of its ability to operate in pure CSMA/CA or TDMA modes. Some operating scenarios for rate-s...