Sciweavers

455 search results - page 55 / 91
» Tradeoffs for Packet Classification
Sort
View
141
Voted
CCS
2003
ACM
15 years 7 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
114
Voted
ICNP
1998
IEEE
15 years 6 months ago
Digital Signatures for Flows and Multicasts
We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based...
Chung Kei Wong, Simon S. Lam
155
Voted
TON
2012
13 years 5 months ago
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...
CEAS
2008
Springer
15 years 4 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
108
Voted
INFOCOM
1998
IEEE
15 years 6 months ago
Adaptive Resource Management for Flow-Based IP/ATM Hybrid Switching Systems
This paper addresses a fundamental problem in resource management for flow-based hybrid switching systems. Such systems aim at efficient transport of layer-3 connectionless IP traf...
Hao Che, San-qi Li, Arthur Y. M. Lin