The role of internet exchange points in broadband policy and regulation - Daniel B. Cavalcanti (2010)
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
15-744: Computer Networking L-14 Network Topology.
FastPass: Availability Tokens to Defeat DoS Presented at CMU Systems Seminar by: Dan Wendlandt Work with: David Andersen & Adrian Perrig.
Eurecom, Sophia-Antipolis Thrasyvoulos Spyropoulos / [email protected] Random Graph Models: Create/Explain Complex Network Properties.
Ten Years in the Evolution of the Internet Ecosystem Amogh Dhamdhere Constantine Dovrolis College of Computing Georgia Tech.
A Brief History of Lognormal and Power Law Distributions and an Application to File Size Distributions Michael Mitzenmacher Harvard University.
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
On management aspects of future ICT systems Associate Professor Evgeny Osipov Head of Dependable Communication and Computation group Luleå University of.
Internet Measurement Tutorial Yuval Shavitt School of Electrical Engineering shavitt.
Computer Science Demystifying the router-level topology John Byers Department of Computer Science and Topology Modeling Group, Boston University CS: Mark.