Random early detection

Results: 102



#Item
91Data / TCP congestion avoidance algorithm / Robust random early detection / Transmission Control Protocol / Network congestion / Denial-of-service attack / Throughput / Packet loss / Congestion window / Network performance / Computing / Network architecture

Low-Rate TCP-Targeted Denial of Service  Attacks (The Shrew vs. the Mice and Elephants) Aleksandar Kuzmanovic and Edward W. Knightly ECE/CS Departments Rice University

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2004-12-28 15:57:39
92Robust random early detection / TR1 / Computing / Computer network security / Denial-of-service attacks / Network performance

PDF Document

Add to Reading List

Source URL: www.bia.gov

Language: English - Date: 2014-10-01 23:38:50
93Network architecture / Denial-of-service attack / UDP flood attack / Transmission Control Protocol / IP address spoofing / Robust random early detection / Router / Broadcast radiation / Network congestion / Denial-of-service attacks / Computer network security / Computing

MULTOPS: a data structure for denial-of-service attack detection by Thomer M. Gil [removed] Submitted to the Division of Mathematics and Computer Science

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
94Network performance / Network architecture / Statistics / Cyberwarfare / Networking hardware / Network congestion / Robust random early detection / Transmission Control Protocol / UDP flood attack / Computing / Denial-of-service attacks / Computer network security

Unsupervised Anomaly Detection System using Next-generation Router Architecture Richard Rouil Nicolas Chevrollier

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-03 16:25:30
95Streaming / Network performance / Internet protocols / Packet loss / Transmission Control Protocol / Real-time Transport Protocol / Robust random early detection / Retransmission / Consistent Overhead Byte Stuffing / Network architecture / Computing / Data

A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications Chinmay Padhye and Kenneth J. Christensen Computer Science and Engineering University of South Florida Tampa, FL, 33620 { padhye, christen} @csee.u

Add to Reading List

Source URL: switzernet.com

Language: English - Date: 2006-01-24 04:26:25
96Network performance / Robust random early detection / Differential geometry of curves / Computing / Differential geometry / Computer network security / Denial-of-service attacks

Speed Scaling to Manage Temperature Leon Atkins1 , Guillaume Aupy2 , Daniel Cole3 , and Kirk Pruhs4,? 1 Department of Computer Science, University of Bristol, [removed] 2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 07:07:18
97Management / Blue / Network congestion / Active queue management / Explicit Congestion Notification / TCP congestion avoidance algorithm / Random early detection / Fair queuing / Transmission Control Protocol / Network performance / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.thefengs.com

Language: English - Date: 2001-05-04 22:24:00
98Management / Active queue management / Blue / Network congestion / Explicit Congestion Notification / TCP global synchronization / Random early detection / Packet loss / Transmission Control Protocol / Network performance / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 1999-05-03 09:48:41
99Computer network security / Data analysis / Anomaly detection / Intrusion detection system / Local outlier factor / Network performance / Misuse detection / Robust random early detection / Outlier / Statistics / Data security / Data mining

PDF Document

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2002-10-29 14:04:58
100Management / Robust random early detection / Active queue management / Random early detection / Network congestion / Blue / Transmission Control Protocol / Denial-of-service attack / Traffic flow / Network performance / Computing / Data

PDF Document

Add to Reading List

Source URL: sites.google.com

Language: English
UPDATE