Sciweavers

382 search results - page 42 / 77
» Tracing Network Attacks to Their Sources
Sort
View
VIZSEC
2005
Springer
14 years 1 months ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
WPES
2003
ACM
14 years 26 days ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
INFOCOM
1996
IEEE
13 years 11 months ago
Video Traffic Characterization for Multimedia Networks with a Deterministic Service
One of the most important traffic types in future packet-switched networks is high-bandwidth, variable-bitrate (VBR) video. Since video is a delay-sensitive media, the network mus...
Dallas E. Wrege, Jörg Liebeherr
INFOCOM
2007
IEEE
14 years 1 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
WWW
2006
ACM
14 years 8 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...