Sciweavers

4812 search results - page 89 / 963
» Superimposed Information for the Internet
Sort
View
LISA
2001
15 years 3 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
IADIS
2003
15 years 3 months ago
Accessible and Usable Internet System Design
The social concept “fragmented group” – is disabling people because it does not provide access to products and services to an enormous segment. Nobody, if they consciously t...
Runa Jesmin
IM
2003
15 years 3 months ago
Towards XML Oriented Internet Management
: Internet Management is based on IETF specifications that have been developed and used during the past 14 years: There are multiple versions and options of the management protoco...
Frank Strauß, Torsten Klie
CCR
2005
64views more  CCR 2005»
15 years 1 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
CCR
2004
119views more  CCR 2004»
15 years 1 months ago
Collecting the internet AS-level topology
At the inter-domain level, the Internet topology can be represented by a graph with Autonomous Systems (ASes) as nodes and AS peerings as links. This AS-level topology graph has b...
Beichuan Zhang, Raymond A. Liu, Daniel Massey, Lix...