Sciweavers

717 search results - page 54 / 144
» IP over SCI
Sort
View
ICPADS
2006
IEEE
15 years 5 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
DSOM
1999
Springer
15 years 4 months ago
JAMAP: A Web-based Management Platform for IP Networks
In this paper, we describe JAMAP, a prototype of a Web-based management platform for IP networks. It is written entirely in Java. It implements the push model to perform regular ma...
Jean-Philippe Martin-Flatin, Laurent Bovet, Jean-P...
CSREASAM
2006
15 years 1 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
CMS
2001
119views Communications» more  CMS 2001»
15 years 1 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
ICASSP
2010
IEEE
15 years 1 days ago
Robust IP and UDP-lite header recovery for packetized multimedia transmission
Recently, Joint Source-Channel Decoding (JSCD) techniques have been proposed to improve the reception of multimedia contents transmitted over error-prone channels. These technique...
François Mériaux, Michel Kieffer