Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
The emerging Car-to-Car communication (C2C) technology, known as Wireless Access in Vehicular Environments (WAVE), enables vehicles on the roadway to communicate with each other a...
Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen,...
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...