Sciweavers

507 search results - page 88 / 102
» Attacking DDoS at the Source
Sort
View
USITS
2003
14 years 11 months ago
Scriptroute: A Public Internet Measurement Facility
We present Scriptroute, a system that allows ordinary Internet users to conduct network measurements from remote vantage points. We seek to combine the flexibility found in dedic...
Neil T. Spring, David Wetherall, Thomas E. Anderso...
CCS
2010
ACM
14 years 10 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
ADHOC
2007
133views more  ADHOC 2007»
14 years 10 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CCR
2010
171views more  CCR 2010»
14 years 10 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
IJNSEC
2008
132views more  IJNSEC 2008»
14 years 9 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller