Sciweavers

3910 search results - page 668 / 782
» Analyzing Cross-Connected Networks
Sort
View
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 11 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
15 years 11 months ago
A DRM Architecture for Manageable P2P Based IPTV System
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After em...
Xiaoyun Liu, Tiejun Huang, Longshe Huo, Luntian Mo...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
INFOCOM
2007
IEEE
15 years 11 months ago
Non-Cooperative Scheduling of Multiple Bag-of-Task Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper we analyze the behavior of K non-cooperative schedu...
Arnaud Legrand, Corinne Touati