Sciweavers

642 search results - page 26 / 129
» Detecting Spoofed Packets
Sort
View
INFOCOM
1999
IEEE
15 years 6 months ago
The Window Distribution of Idealized TCP Congestion Avoidance with Variable Packet Loss
Abstract--This paper analyzes the stationary behavior of the TCP congestion window performing ideal congestion avoidance when the packet loss probability is not constant, but varie...
Archan Misra, Teunis J. Ott
ICNP
1998
IEEE
15 years 6 months ago
Applying MSTDM to Packet Voice and Data in Cellular Radio Systems
MSTDM is a variant of the Ethernet protocol that provides quality of service guarantees for voice. This protocol has been applied to LAN's and CATV networks. Cellular network...
Nicholas F. Maxemchuk
INFOCOM
2010
IEEE
15 years 11 days ago
High Performance Dictionary-Based String Matching for Deep Packet Inspection
—Dictionary-Based String Matching (DBSM) is used in network Deep Packet Inspection (DPI) applications virus scanning [1] and network intrusion detection [2]. We propose the Pipel...
Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna
FC
2003
Springer
77views Cryptology» more  FC 2003»
15 years 7 months ago
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks
We propose a micro-payment scheme for multi-hop cellular networks that encourages collaboration in packet forwarding by letting users benefit from relaying others’ packets. At t...
Markus Jakobsson, Jean-Pierre Hubaux, Levente Butt...
RAID
1999
Springer
15 years 6 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li