Sciweavers

507 search results - page 85 / 102
» Attacking DDoS at the Source
Sort
View
IPTPS
2005
Springer
15 years 3 months ago
An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System
Maze1 is a P2P file-sharing system with an active and large user base. It is developed, deployed and operated by an academic research team. As such, it offers ample opportunities ...
Mao Yang, Zheng Zhang, Xiaoming Li, Yafei Dai
EUROSEC
2010
ACM
15 years 3 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
DISCEX
2003
IEEE
15 years 3 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
INFOCOM
2003
IEEE
15 years 3 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
IPPS
2002
IEEE
15 years 2 months ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien