Sciweavers

9316 search results - page 3 / 1864
» Analysis of traceback techniques
Sort
View
ISCAS
2008
IEEE
111views Hardware» more  ISCAS 2008»
14 years 21 days ago
Low-power traceback MAP decoding for double-binary convolutional turbo decoder
—Convolutional turbo decoding requires large data access and consumes large memories. To reduce the size of the metrics memory, the traceback MAP decoding is introduced for doubl...
Cheng-Hung Lin, Chun-Yu Chen, An-Yeu Wu
INFOCOM
2011
IEEE
12 years 9 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
CCS
2007
ACM
14 years 14 days ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 5 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 17 days ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...