Sciweavers

642 search results - page 34 / 129
» Detecting Spoofed Packets
Sort
View
139
Voted
TIFS
2008
136views more  TIFS 2008»
15 years 1 months ago
Distributed Detection of Information Flows
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Ting He, Lang Tong
MMS
1998
15 years 1 months ago
Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms
In packet audio applications, packets are buffered at a receiving site and their playout delayed in order to compensate for variable network delays. In this paper, we consider the ...
Sue B. Moon, James F. Kurose, Donald F. Towsley
INFOCOM
2009
IEEE
15 years 8 months ago
Packet Classification Algorithms: From Theory to Practice
—During the past decade, the packet classification problem has been widely studied to accelerate network applications such as access control, traffic engineering and intrusion de...
Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Ju...
TON
2010
300views more  TON 2010»
15 years 9 days ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
ANCS
2006
ACM
15 years 5 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo