Sciweavers

642 search results - page 20 / 129
» Detecting Spoofed Packets
Sort
View
SIGMETRICS
1998
ACM
127views Hardware» more  SIGMETRICS 1998»
14 years 11 months ago
On Calibrating Measurements of Packet Transit Times
We discuss the problem of detecting errors in measurements of the total delay experienced by packets transmitted through a wide-area network. We assume that we have measurements o...
Vern Paxson
ADHOCNOW
2003
Springer
15 years 5 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
JSAC
2006
165views more  JSAC 2006»
14 years 11 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ICIP
2004
IEEE
16 years 1 months ago
Visibility of individual packet losses in MPEG-2 video
The ability of a human to visually detect whether a packet has been lost during the transport of compressed video depends heavily on the location of the packet loss and the content...
Amy R. Reibman, Sandeep Kanumuri, Vinay A. Vaisham...
KES
2005
Springer
15 years 5 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang