Sciweavers

ICOIN
2007
Springer
15 years 6 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ICOIN
2007
Springer
15 years 6 months ago
Analyzing and Modeling Router-Level Internet Topology
Measurement studies on the Internet topology show that connectivities of nodes exhibit power–law attribute, but it is apparent that only the degree distribution does not determin...
Ryota Fukumoto, Shin'ichi Arakawa, Tetsuya Takine,...
ICOIN
2007
Springer
15 years 6 months ago
Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network
Abstract. IEEE 802.15.4 is the Low-Rate Wireless Personal Area Network (LR-WPAN) standard that is suitable for wireless sensor networks and wireless home networks among others. The...
Sangki Yun, Hyogon Kim
ICOIN
2007
Springer
15 years 6 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
ICOIN
2007
Springer
15 years 6 months ago
De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
Communications
Top of PageReset Settings