Sciweavers

448 search results - page 38 / 90
» Modeling the Burstiness of TCP
Sort
View
WWW
2008
ACM
16 years 2 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
118
Voted
JSS
2008
96views more  JSS 2008»
15 years 1 months ago
DR-TCP: Downloadable and reconfigurable TCP
Advances in communication technology allow a variety of new network environments and services available very rapidly. Appearance of various network environments tends to enable a ...
Jae-Hyun Hwang, Jin-Hee Choi, Se-Won Kim, Chuck Yo...
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
15 years 3 months ago
A mathematical model of the Skype VoIP congestion control algorithm
The Internet is changing from being only an efficient platform for data delivery to become also a platform for audio/video applications. The stability of the traditional Internet i...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano
JCO
2006
126views more  JCO 2006»
15 years 1 months ago
Combinatorics of TCP reordering
We study a combinatorial problem motivated by a receiver-oriented model of TCP traffic from [7], that incorporates information on both arrival times, and the dynamics of packet IDs...
Anders Hansson, Gabriel Istrate, Shiva Prasad Kasi...
94
Voted
RAID
1999
Springer
15 years 5 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf