Sciweavers

TMA
2012
Springer
268views Management» more  TMA 2012»
12 years 8 months ago
Identifying Skype Nodes in the Network Exploiting Mutual Contacts
Abstract. In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting...
Jan Jusko, Martin Rehák
CCR
2007
119views more  CCR 2007»
14 years 13 days ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
Felipe Huici, Mark Handley