Sciweavers

7329 search results - page 1284 / 1466
» Network Extractor Protocols
Sort
View
IJSN
2007
82views more  IJSN 2007»
15 years 4 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
TPDS
2008
262views more  TPDS 2008»
15 years 3 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
127
Voted
COMCOM
2004
81views more  COMCOM 2004»
15 years 3 months ago
A performance anomaly in clustered on-line transaction processing systems
This paper presents a simulation study on complex On-Line Transaction Processing systems using TPC-C workload. The impacts on the response time of Inter-Connection Network (ICN) i...
Hong Cai, Hisao Kameda, Jie Li
CCR
2000
94views more  CCR 2000»
15 years 3 months ago
An application developer's perspective on reliable multicast for distributed interactive media
In this paper we investigate which characteristics reliable multicast services should have in order to be appropriate for use by distributed interactive media applications such as...
Martin Mauve, Volker Hilt
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
« Prev « First page 1284 / 1466 Last » Next »