Sciweavers

11 search results - page 1 / 3
» icoin 2005
Sort
View
ICOIN
2005
Springer
13 years 9 months ago
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities
O-Hoon Kwon, Seung-Min Lee, Heejo Lee, Jong Kim, S...
ICOIN
2005
Springer
13 years 9 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
ICOIN
2005
Springer
13 years 9 months ago
Decreasing Mobile IPv6 Signaling with XCAST
Abstract. Mobile IPv6 is the IETF proposition to support host mobility in the Internet. It provides routing optimization for packets sent to the mobile node at the expense of signa...
Thierry Ernst
ICOIN
2005
Springer
13 years 9 months ago
A New Congestion Control Mechanism of TCP with Inline Network Measurement
In this paper, we propose a novel congestion control mechanism of TCP, by using an inline network measurement technique. By using information of available bandwidth of a network pa...
Tomohito Iguchi, Go Hasegawa, Masayuki Murata
ICOIN
2005
Springer
13 years 9 months ago
A Rerouting Scheme with Dynamic Control of Restoration Scope for Survivable MPLS Network
This paper proposes a rerouting scheme that can be applied to the restoration of working Label Switched Paths (LSPs) and preprovisioned backup LSPs, which consists of two subsequen...
Daniel Won-Kyu Hong, Choong Seon Hong