The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
In a bid to extend web browsers capabilities, a new extension that transfers HTTP session between two web browsers also knows as User Agents will be developed. The capabilities of...
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Distributed Denial of Service (DDoS) attacks represent a serious threat to the appropriate operation of Internet services. To deal with this threat, we propose an IP traceback sys...