Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. Learn more about USENIX’s values and how we put them into practice at our conferences.
A constraint definition assigns a name to the result of a constraint expression: GettysburgAddress = starts with "Four score and seven years ago", ends with "shall not perish from the earth" ...
{svasu,kurose,towsley}@cs.umass.edu {dina.papagiannaki,christophe.diot}@intel.com ...
In this section, we describe how an end-host can estimate both the potential upstream and downstream bandwidth between the AP and itself. The final affiliation decision made by the end-host is going ...
The total delay incurred by a data frame from an AP in the absence of handshake is given by: the contention and transmission delay of the data frame plus the respective delay.
Daemon written in C, client is a shell script ICMP Echo Reply flooder Attacker supplied source address or R.R.R.R (0=R=255) ...
The main problem with user authentication on the Web is that many sites are used infrequently and people forget their passwords over time. Another problem is that the ...
Our proposed approach to estimating the upstream bandwidth requires that the end-host sends data frames to an access point in the unaffiliated state and records the time elapsed between the instant ...
After the portfolio selection phase, we use a short training phase to improve the memorability of the portfolio images. During training, the user points out the pictures in her portfolio from a ...
In this paper, we argued for potential bandwidth between AP and end-host as an important metric in the process of AP selection. We described a methodology for estimating the potential bandwidth based ...
Same attacks as TFN, but can randomly do them all at once Encryption added to improve security of the DDoS network Control traffic uses UDP/TCP/ICMP Same source address forgery features as TFN ...
In August of 1999, a trinoo network of 2,200 systems was used against the University of Minnessota and several other sites worldwide. The group suspected of waging these attacks used a compromised ...