Sciweavers

7329 search results - page 1322 / 1466
» Network Extractor Protocols
Sort
View
USITS
2003
15 years 5 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
IM
1997
15 years 5 months ago
The Hollowman: An Innovative ATM Control Architecture
The current implementation of out-of-band control in ATM networks inhibits their successful exploitation. The confusion in signalling protocols between application services and th...
Sean Rooney
DAIS
2009
15 years 4 months ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
SIGCOMM
2010
ACM
15 years 4 months ago
Accelerating SSL with GPUs
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
« Prev « First page 1322 / 1466 Last » Next »