Sciweavers

18 search results - page 2 / 4
» High performance traffic shaping for DDoS mitigation
Sort
View
ICWN
2004
13 years 7 months ago
Sustaining Performance Under Traffic Overload
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad h...
Saman Desilva, Rajendra V. Boppana
PE
2002
Springer
118views Optimization» more  PE 2002»
13 years 5 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris
GLOBECOM
2010
IEEE
13 years 3 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
WSC
1998
13 years 6 months ago
Sensitivity of Output Performance Measures to Input Distributions in Queueing Network Modeling
In Gross and Juttijudata (1997) a single node, G/G/1 queue was investigated as to the sensitivity of output performance measures, such as the mean queue wait, to the shape of the ...
Donald Gross, Denise M. Bevilacqua Masi
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 5 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...