Sciweavers

78 search results - page 15 / 16
» Improving stream correlation attacks on anonymous networks
Sort
View
GLOBECOM
2006
IEEE
13 years 11 months ago
Multiple-Hop Routing Based on the Pulse-Position Modulation Header Processing Scheme in All-Optical Ultrafast Packet Switching N
— In this paper we present modeling and simulation of multiple-hop all-optical packet routing based on the pulseposition modulation header processing (PPM-HP) scheme in ultrafast...
Hoa Le Minh, Zabih Ghassemlooy, Wai Pang Ng
ICALP
2009
Springer
14 years 6 months ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
ACMSE
2006
ACM
13 years 11 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
ACMSE
2005
ACM
13 years 11 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ICDCSW
2005
IEEE
13 years 11 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...