Sciweavers

455 search results - page 74 / 91
» Peer-to-Peer Traffic in Operator Networks
Sort
View
TNC
2004
120views Education» more  TNC 2004»
14 years 11 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
WORDS
2005
IEEE
15 years 3 months ago
A Framework for Middleware Supporting Real-Time Wide-Area Distributed Computing
: The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise t...
K. H. (Kane) Kim, Stephen F. Jenks, Larry Smarr, A...
ANCS
2007
ACM
15 years 1 months ago
Experimenting with buffer sizes in routers
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
COMPSEC
2006
110views more  COMPSEC 2006»
14 years 9 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...

Publication
420views
16 years 8 months ago
Adaptive Multilevel Early Congestion Notification
We propose Adaptive Multi-level ECN, a new TCP congestion scheme as an extension to Multi-level Explicit Congestion Notification (MECN). MECN algo- rithm allows network operators t...
A. Durresi, M. Sridharan, Raj Jain