Sciweavers

717 search results - page 89 / 144
» IP over SCI
Sort
View
ENTCS
2006
175views more  ENTCS 2006»
15 years 4 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
CN
2007
104views more  CN 2007»
15 years 4 months ago
Managing feature interactions between distributed SIP call control services
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
Mario Kolberg, Evan H. Magill
INFOCOM
2010
IEEE
15 years 2 months ago
Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems
—Network positioning systems provide an important service to large-scale P2P systems, potentially enabling clients to achieve higher performance, reduce cross-ISP traffic and im...
David R. Choffnes, Mario Sanchez, Fabian E. Bustam...
NOMS
2010
IEEE
147views Communications» more  NOMS 2010»
15 years 2 months ago
Distributed approaches to S-CSCF selection in an IMS network
—The IP Multimedia Subsystem (IMS) is a generic open-systems architecture offering converged multimedia services over IP. A function in the signaling plane of an IMS network is t...
Plarent Tirana, Deep Medhi
ACSAC
2010
IEEE
15 years 2 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...