Sciweavers

945 search results - page 36 / 189
» Working the Flow
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang
FMCAD
2008
Springer
13 years 9 months ago
Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow
Synchronous Data flow (SDF) graphs have a simple and elegant semantics (essentially linear algebra) which makes SDF graphs eminently suitable as a vehicle for studying scheduling o...
Pieter H. Hartel, Theo C. Ruys, Marc C. W. Geilen
TC
2001
13 years 9 months ago
The information integrity imperative
The paper first develops the core IS view of business activity, which comprises informational and physical work systems and central to which is the informational work system deliv...
Madhavan K. Nayar
GLOBECOM
2007
IEEE
14 years 2 months ago
Inter-Area Shared Segment Protection of MPLS Flows Over Agile All-Photonic Star Networks
—We study the resilience of MPLS flows over an agile all-photonic star WDM network (AAPN). On the basis of our previous inter-area optimal routing architecture, we propose and de...
Peng He, Gregor von Bochmann
SEC
2008
13 years 9 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...