Sciweavers

381 search results - page 34 / 77
» host 2008
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Inferring Internet Worm Temporal Characteristics
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
MMSP
2008
IEEE
148views Multimedia» more  MMSP 2008»
14 years 2 months ago
Optimal server bandwidth allocation for streaming multiple streams via P2P multicast
—We consider the general scenario where content hosted by the server comprises streams and each peer can subscribe one or more streams. Multiple multicast trees are built to deli...
Aditya Mavlankar, Jeonghun Noh, Pierpaolo Bacciche...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 2 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
SAINT
2008
IEEE
14 years 2 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
WETICE
2008
IEEE
14 years 2 months ago
On NAT Traversal in Peer-to-Peer Applications
A widely used technique to overcome the shortage of unique public IP addresses is Network Address Translation (NAT), which hides several hosts behind a single public address. This...
Konstantin Pussep, M. Weinert, Aleksandra Kovacevi...