Sciweavers

2207 search results - page 417 / 442
» Security at the Internet Layer
Sort
View
NCM
2010
14 years 8 months ago
Blink: Large-scale P2P network monitoring and visualization system using VM introspection
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
CLEIEJ
2010
14 years 7 months ago
Design, Implementation and Use of a Remote Network Lab with Multiple Users Support as an Aid Teaching Computer Networks
This article presents the design, implementation and use of a remote network lab with multiple users support as an aid to teaching computer networks. The purpose is to enable mult...
Marco Aravena Vivar, Cristian Rodriguez, Andres Ra...
IFIP
2010
Springer
14 years 4 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
JIPS
2010
462views more  JIPS 2010»
14 years 4 months ago
Challenges to Next Generation Services in IP Multimedia Subsystem
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Sub...
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han...
IEEESP
2011
14 years 28 days ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...