Sciweavers

1718 search results - page 256 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
87
Voted
BROADNETS
2007
IEEE
15 years 4 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
INFOCOM
2007
IEEE
15 years 4 months ago
Empirical Evaluation of Techniques for Measuring Available Bandwidth
Abstract— The ability to measure end-to-end Available Bandwidth (AB) on a network path is useful in several domains, including overlay-routing infrastructure, network monitoring,...
Alok Shriram, Jasleen Kaur
ICNP
2006
IEEE
15 years 3 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICN
2009
Springer
15 years 2 months ago
Trainspotting, a WSN-Based Train Integrity System
In contrast to classic train protection systems where most of the safety measures are built into the rail infrastructure, future versions of the European railway safety system ERT...
Hans Scholten, Roel Westenberg, Manfred Schoemaker