Sciweavers

967 search results - page 169 / 194
» COSY communication IP's
Sort
View
IWCMC
2010
ACM
15 years 2 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
KIVS
2001
Springer
15 years 2 months ago
Evaluating the GPRS Radio Interface for Different Quality of Service Profiles
This paper presents a discrete-event simulator for the General Packet Radio Service (GPRS) on the IP level. GPRS is a standard on packet data in GSM systems that will become commer...
Christoph Lindemann, Axel Thümmler
ICPPW
1999
IEEE
15 years 2 months ago
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System
A distributed WWW caching system based on Internet Cache Protocol (ICP) is a system where a cache of a single proxy server is shared by others. When a proxy server receives an HTT...
Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hid...
ANSS
2004
IEEE
15 years 1 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
APNOMS
2006
Springer
15 years 1 months ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi