<--- Back to Details
First PageDocument Content
Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds
Date: 2016-04-22 11:14:02
Computing
Routing algorithms
Cyberwarfare
Concurrent computing
Denial-of-service attack
Denial-of-service attacks
Internet Relay Chat
Computer network
Multipath routing
Botnet
Routing
Crowds

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

Add to Reading List

Source URL: inspire.edu.gr

Download Document from Source Website

File Size: 629,09 KB

Share Document on Facebook

Similar Documents

The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1  Computer Science Department

The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1 Computer Science Department

DocID: 1uqsM - View Document

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks Yiting Liao and Jerry D. Gibson Department of Electrical and Computer Engineering University of Californi

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks Yiting Liao and Jerry D. Gibson Department of Electrical and Computer Engineering University of Californi

DocID: 1rCPw - View Document

FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks Abdul Kabbani Balajee Vamanan

FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks Abdul Kabbani Balajee Vamanan

DocID: 1rtxQ - View Document

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

DocID: 1rt8e - View Document

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC  2 ETH Zurich, Switzerland

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

DocID: 1raw5 - View Document