Sciweavers

53 search results - page 7 / 11
» Tracking Long Duration Flows in Network Traffic
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
Event Recognition with Fragmented Object Tracks
Complete and accurate video tracking is very difficult to achieve in practice due to long occlusions, traffic clutter, shadows and appearance changes. In this paper, we study the ...
Anthony Hoogs, Gianfranco Doretto, John Schmiedere...
CCS
2003
ACM
14 years 8 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 8 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CCS
2006
ACM
13 years 10 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
NETWORKING
2004
13 years 8 months ago
The Sensitivity of TCP to Sudden Delay Variations in Mobile Networks
Abstract. This paper studies the impact of variable transmission delays on the Transmission Control Protocol (TCP). Sudden delay variations, which are not uncommon in mobile networ...
Michael Scharf, Marc Necker, Bernd Gloss