Sciweavers

642 search results - page 88 / 129
» Detecting Spoofed Packets
Sort
View
ICC
2007
IEEE
15 years 11 months ago
Novel Link Weight for Path Construction Based on Overall QoS Index
— A weight or cost is usually assigned to each link for consideration in path construction, and the delay and loss rate have been used as conventional link weights. However, when...
Yudai Nitta, Taro Hashimoto, Katsuyoshi Iida, Kats...
134
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
110
Voted
PAM
2007
Springer
15 years 10 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
114
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood