Sciweavers

274 search results - page 31 / 55
» infocom 2010
Sort
View
84
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
INFOCOM
2010
IEEE
14 years 8 months ago
Building Scalable Virtual Routers with Trie Braiding
—Many popular algorithms for fast packet forwarding and filtering rely on the tree data structure. Examples are the trie-based IP lookup and packet classification algorithms. W...
Haoyu Song, Murali S. Kodialam, Fang Hao, T. V. La...
INFOCOM
2010
IEEE
14 years 8 months ago
Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video S
—This paper presents a novel scheme, Layered Internet Video Engineering (LIVE), in which network nodes feed back virtual congestion levels to video senders to assist both media-a...
Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, Vijay S...
INFOCOM
2010
IEEE
14 years 8 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...
73
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Optimal Probing for Unicast Network Delay Tomography
—Network tomography has been proposed to ascertain internal network performances from end-to-end measurements. In this work, we present priority probing, an optimal probing schem...
Yu Gu, Guofei Jiang, Vishal Singh, Yueping Zhang