Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Abstract--Current implementations of BitTorrent-like P2P applications ignore the underlying Internet topology hence incur a large amount of traffic both inside an Internet Service ...
Chen Tian, Xue Liu, Hongbo Jiang, Wenyu Liu, Yi Wa...
Scientific articles are tailored to present information in human-readable aliquots. Although the Internet has revolutionized the way our society thinks about information, the trad...
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synerg...
Purpose – This paper sets out to present the concept of the value of information, review the descriptive, rational, social and behavioral approaches for assessing the value of i...