Sciweavers

1112 search results - page 175 / 223
» On scalable attack detection in the network
Sort
View
IPPS
2002
IEEE
15 years 4 months ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien
SIGCOMM
2010
ACM
15 years 17 hour ago
Twittering by cuckoo: decentralized and socio-aware online microblogging services
Online microblogging services, as exemplified by Twitter, have become immensely popular during the latest years. However, current microblogging systems severely suffer from perfor...
Tianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui
WPES
2006
ACM
15 years 5 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
SIGCOMM
2010
ACM
15 years 17 hour ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
CSREASAM
2006
15 years 1 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson