Sciweavers

273 search results - page 26 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View

Lecture Notes
742views
16 years 9 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
PAM
2012
Springer
13 years 7 months ago
Probe and Pray: Using UPnP for Home Network Measurements
Network measurement practitioners increasingly focus their interest on understanding and debugging home networks. The Universal Plug and Play (UPnP) technology holds promise as a h...
Lucas DiCioccio, Renata Teixeira, Martin May, Chri...
VIZSEC
2004
Springer
15 years 5 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
ICNS
2007
IEEE
15 years 6 months ago
IGMPS, a New Tool for Estimating End-to-End Available Bandwidth in IP Network Paths
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
Ahmed Ait Ali, Francis Lepage
SIGMETRICS
2002
ACM
159views Hardware» more  SIGMETRICS 2002»
14 years 11 months ago
Limits of wide-area thin-client computing
While many application service providers have proposed using thin-client computing to deliver computational services over the Internet, little work has been done to evaluate the e...
Albert M. Lai, Jason Nieh