Sciweavers

37 search results - page 2 / 8
» Performance comparison of reduced models for leak detection ...
Sort
View
ICNP
2002
IEEE
13 years 10 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 days ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
EJWCN
2010
229views more  EJWCN 2010»
13 years 6 days ago
Throughput-Efficient Dynamic Coalition Formation in Distributed Cognitive Radio Networks
We formulate the problem of distributed throughput-efficient sensing in cognitive radio (CR) networks as a dynamic coalition formation game based on a Markovian model. The propose...
Zaheer Khan, Janne J. Lehtomäki, Marian Codre...
CN
2002
98views more  CN 2002»
13 years 5 months ago
New models and algorithms for programmable networks
In todays IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to la...
Danny Raz, Yuval Shavitt
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 3 months ago
Spectral methods for the detection of network community structure: a comparative analysis
Spectral analysis has been successfully applied to the detection of community structure of networks, respectively being based on the adjacency matrix, the standard Laplacian matrix...
Hua-Wei Shen, Xue-Qi Cheng