Sciweavers

642 search results - page 119 / 129
» Detecting Spoofed Packets
Sort
View
CCS
2010
ACM
14 years 12 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
CCR
2006
85views more  CCR 2006»
14 years 11 months ago
Troubleshooting wireless mesh networks
Effective network troubleshooting is critical for maintaining efficient and reliable network operation. Troubleshooting is especially challenging in multi-hop wireless networks be...
Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou
ENTCS
2006
175views more  ENTCS 2006»
14 years 11 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
JNW
2008
129views more  JNW 2008»
14 years 11 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
JSAC
2008
196views more  JSAC 2008»
14 years 11 months ago
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks
Abstract--This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for ...
Affan A. Syed, Wei Ye, John S. Heidemann