Sciweavers

382 search results - page 40 / 77
» Tracing Network Attacks to Their Sources
Sort
View
KES
2005
Springer
14 years 2 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
INFOCOM
1997
IEEE
14 years 1 months ago
Exploiting the Temporal Structure of MPEG Video for the Reduction of Bandwidth Requirements
We propose a new bandwidth allocation scheme for VBR video tra c in ATM networks. The scheme is tailored to MPEG-coded video sources that require stringent and deterministic quali...
Marwan Krunz, Satish K. Tripathi
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 9 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
AINA
2010
IEEE
14 years 1 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
DISCEX
2003
IEEE
14 years 2 months ago
Traceback of Single IP Packets Using SPIE
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. IP traceback techniques have been developed to determine the source of large...
W. Timothy Strayer, Christine E. Jones, Fabrice Tc...