Zippy: On-demand network flooding
… We present ZiPPY, an on-demand flooding technique that provides robust asynchronous
net… to demonstrate the on-demand flooding of rare events through a multihop network with end-…
net… to demonstrate the on-demand flooding of rare events through a multihop network with end-…
Bypass routing: An on-demand local recovery protocol for ad hoc networks
… Other protocols reduce the frequency of flooding by allowing a relay node to initiate a limited
… an efficient on-demand local recovery protocol that reduces route request floods due to …
… an efficient on-demand local recovery protocol that reduces route request floods due to …
A survey of link flooding attacks in software defined network ecosystems
… This attack type has the ability to disable network links by flooding them with attack traffic. …
against TCP SYN flooding attack where an attacking application floods the control plane by …
against TCP SYN flooding attack where an attacking application floods the control plane by …
A Simple and Energy‐Efficient Flooding Scheme for Wireless Routing
S Yamazaki, Y Abiko, H Mizuno - … Communications and Mobile …, 2020 - Wiley Online Library
… Flooding efficiency is important for nodes, because they are driven by limited batteries. In
this paper, we propose a simple flooding … scheme to ad hoc on-demand distance vector (AODV…
this paper, we propose a simple flooding … scheme to ad hoc on-demand distance vector (AODV…
Internet factories: Creating application-specific networks on-demand
… The number of concurrently running operations to create network elements was limited to
15 to avoid Amazon EC2 denying service due to a flood of service requests. The number was …
15 to avoid Amazon EC2 denying service due to a flood of service requests. The number was …
[PDF][PDF] CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Y Gilad, A Herzberg, M Sudkovitch, M Goberman - NDSS, 2016 - ndss-symposium.org
… agent that clients automatically download from the content-origin … Clientless secure-objects
allow CDN-on-Demand to utilize … set of measurements we evaluate direct flooding attacks (ie, …
allow CDN-on-Demand to utilize … set of measurements we evaluate direct flooding attacks (ie, …
Puppet attack: A denial of service attack in advanced metering infrastructure network
… attacker and flood more packets so as to exhaust the network … the same damage as a flooding
attack and the proposed … an on-demand routing protocol using in wireless mesh network…
attack and the proposed … an on-demand routing protocol using in wireless mesh network…
An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks
A Dhanapal, P Nithyanandam - Wireless Networks, 2021 - Springer
… on-demand network access to a shared pool of configurable computing resources such as
networks… five characteristics: on-demand self-service, broad network access, resource pooling…
networks… five characteristics: on-demand self-service, broad network access, resource pooling…
A heterogeneous system architecture for event-triggered wireless sensing
F Sutton, R Da Forno, D Gschwend… - … in Sensor Networks …, 2016 - ieeexplore.ieee.org
… Network Wake-up. Due to the non-deterministic nature of acoustic … eg, ZIPPY [2], for the
rapid wake-up of a multi-hop network. The ZIPPY protocol provides on-demand network flooding …
rapid wake-up of a multi-hop network. The ZIPPY protocol provides on-demand network flooding …
On-demand multicast routing protocol with efficient route discovery
… of On-Demand Multicast Routing Protocol (ODMRP). Our framework, called limited flooding
ODMRP, improves multicasting mechanism by efficiently managing flooding mechanism …
ODMRP, improves multicasting mechanism by efficiently managing flooding mechanism …