Skip to main content
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
    • by 
    •   3  
      Computer ScienceIOSR Journal of Computer EngineeringTelnet
A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was... more
    • by 
    •   6  
      Computer ScienceComputer SecurityPasswordLogin
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
    • by 
    •   3  
      Computer ScienceIOSR Journal of Computer EngineeringTelnet
A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was... more
    • by 
    •   6  
      Computer ScienceComputer SecurityPasswordLogin
Basically creativity into something very important, when the technology changes so  quickly. 486-DX computer for example, who used to be proud of now no more than  an old machine that is more worthy of display company warehouses.  Linux c... more
    • by 
    •   5  
      Computer ScienceOPERATING SYSTEMServerRouter
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identity by staging their attacks through intermediate "stepping... more
    • by 
    •   11  
      Computer ScienceIntrusion Detection SystemsEncryptionThe Internet
For many users of networks like the ARPANET, an RJE protocol is probably as important in terms of utility as the TELNET (or Virtual Terminal) protocol. In fact, the facilities provided by a TELNET and an RJE protocol are probably of most... more
    • by 
    •   7  
      Computer ScienceDistributed ComputingOPERATING SYSTEMComputer Software
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
    • by 
    •   8  
      Computer ScienceMobile Ad Hoc NetworkComputer NetworkMobile Adhoc Networks
The development of networks for converged services including voice, video and data over the same infrastructure requires appropriate planning and dimensioning. This work presents a methodology, based on discrete event simulation, that... more
    • by 
    •   5  
      Computer ScienceVoice over IPQuality of ServiceDimensioning
The dominant operating system on the Internet, Linux is quite prevalent, considering that the overwhelming majority of servers running web services, email services, and name services all depend on other open-source code that works with... more
    • by 
    •   4  
      Computer ScienceOPERATING SYSTEMServerTelnet
The dominant operating system on the Internet, Linux is quite prevalent, considering that the overwhelming majority of servers running web services, email services, and name services all depend on other open-source code that works with... more
    • by 
    •   4  
      Computer ScienceOPERATING SYSTEMServerTelnet
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingCongestion ControlFlow Control
    • by 
    •   7  
      Computer ScienceASCIIPasswordLogin
Introduces the reader to the history of the Internet and the requirements for accessing it. The three major capabilities of the Internet-electronic mail, telnet, and file transfer protocolare discussed. Examples of how Jewish Internet... more
    • by 
    •   12  
      Computer ScienceJewish StudiesInformation LiteracyLibrary and Information Science
Basically creativity into something very important, when the technology changes so  quickly. 486-DX computer for example, who used to be proud of now no more than  an old machine that is more worthy of display company warehouses.  Linux c... more
    • by 
    •   5  
      Computer ScienceOPERATING SYSTEMServerRouter
Intruders which log-in through a series of machines when conducting an attack are hard to trace because of the complex architecture of the Internet. The thumbprinting method provides an efficient way to tracing such intruders by... more
    • by 
    •   3  
      Computer ScienceThe InternetTracing
In Linux Router management, the Traffic Control tool is still the unique method provided to network managers for monitoring and configuration. Scripts invoked through telnet are used for this purpose. Router monitoring is obtained by... more
    • by 
    •   8  
      Computer ScienceNetwork ManagementOPERATING SYSTEMComputer Network
Reflection on the forms and possibilities of Internet use in education does not keep pace with the speed with which access for schools is provided worldwide. For an in-depth educational discussion, we need to differentiate types of... more
    • by 
    •   8  
      Mailing ListsMailNewsgroupsGopher
    • by 
    •   15  
      Computer ScienceEducational TechnologyHeuristicsTypology
Start Network devices are generally programmed over the serial ports (COM-RS232) or over the network via telnet protocol or ssh protocol. The communication process via the Telnet protocol and COM port is done unencrypted. Therefore, there... more
    • by 
    •   3  
      Computer ScienceEncryptionTelnet
Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the... more
    • by 
    •   6  
      Computer ScienceComputer SecurityWeb ServerFile Transfer Protocol
Basically creativity into something very important, when the technology changes so  quickly. 486-DX computer for example, who used to be proud of now no more than  an old machine that is more worthy of display company warehouses.  Linux c... more
    • by 
    •   5  
      Computer ScienceOPERATING SYSTEMServerRouter
    • by 
    •   8  
      Computer ScienceChemistryMultidisciplinaryThe Internet
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
    • by 
    •   3  
      Computer ScienceIOSR Journal of Computer EngineeringTelnet
Individual machines are no longer sufficient to handle the offered load to many Internet sites. To use multiple machines for scalable performance, load balancing, fault transparency, and backward compatibility with URL naming must be... more
    • by 
    •   10  
      Computer ScienceThe InternetComputer NetworkInternet Service Provider
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
    • by 
    •   17  
      Computer ScienceNetworksPacket SwitchingComputer Network
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
    • by 
    •   17  
      Computer ScienceNetworksPacket SwitchingComputer Network
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingCongestion ControlFlow Control
Teknik Jaringan tidak pernah dipisahkan dengan kongurasi yang merupakan tugas utama yang harus dilakukan dengan tujuan untuk membuatnya berfungsi. Seperti yang kita ketahui, untuk mengkongurasi beberapa perangkat baik server, switch, atau... more
    • by 
    •   5  
      Computer ScienceComputer Hardware and NetworkingComputer NetworkRouter
In Linux Router management, the Traffic Control tool is still the unique method provided to network managers for monitoring and configuration. Scripts invoked through telnet are used for this purpose. Router monitoring is obtained by... more
    • by 
    •   8  
      Computer ScienceNetwork ManagementOPERATING SYSTEMComputer Network
Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the... more
    • by 
    •   6  
      Computer ScienceComputer SecurityWeb ServerFile Transfer Protocol
Teknik Jaringan tidak pernah dipisahkan dengan kongurasi yang merupakan tugas utama yang harus dilakukan dengan tujuan untuk membuatnya berfungsi. Seperti yang kita ketahui, untuk mengkongurasi beberapa perangkat baik server, switch, atau... more
    • by 
    •   5  
      Computer ScienceComputer Hardware and NetworkingComputer NetworkRouter
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
    • by 
    •   17  
      Computer ScienceNetworksPacket SwitchingComputer Network
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingCongestion ControlFlow Control
Instant messaging(IM) is a real-time communication medium between two or more people. Users can exchange messages privately or involve in group conversations. Today, IM does not only allow text messages, it can also send images and audio... more
    • by 
    •   7  
      EngineeringComputer ScienceConversationSoftware
Hackers on the Internet usually send attacking packets using compromised hosts, called stepping-stones, in order to avoid being detected and caught. With stepping-stone attacks, an intruder remotely logins these stepping-stones using... more
    • by 
    •   6  
      Computer ScienceDistributed ComputingHackerIntrusion Detection System
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as... more
    • by 
    •   8  
      Computer ScienceComputer NetworksSensorThe Internet
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task involving various hardware components with different... more
    • by 
    •   11  
      Information SystemsCognitive ScienceComputer ScienceUbiquitous Computing
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
    • by 
    •   17  
      Computer ScienceNetworksPacket SwitchingComputer Network
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingCongestion ControlFlow Control
Basically creativity into something very important, when the technology changes so  quickly. 486-DX computer for example, who used to be proud of now no more than  an old machine that is more worthy of display company warehouses.  Linux c... more
    • by 
    •   5  
      Computer ScienceOPERATING SYSTEMServerRouter
This system facilitates mailing among the users of an internet, having an efficient and easy to communicate with telecommunications. The mails are transmitted and receiving by individual users registered in a mail management server. To... more
    • by 
    •   6  
      Computer ScienceCloud ComputingThe InternetIntranet
Aplikasi penelitian agent remote akan memudahkan kerja admin untuk melakukan pengawasan terhadap server yang dikelolanya. Admin akan melakukan remote dengan cara login telnet melalui mobile device. Kemudian akan muncul tampilan terminal... more
    • by 
    •   3  
      Computer ScienceOPERATING SYSTEMTelnet
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
    • by 
    •   8  
      Computer ScienceMobile Ad Hoc NetworkComputer NetworkMobile Adhoc Networks
    • by 
    •   5  
      Computer ScienceMacroByteRFC
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
    • by 
    •   7  
      Computer ScienceComputer NetworkMobile Adhoc NetworksParallel and Distributed Systems
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
    • by 
    •   17  
      Computer ScienceNetworksPacket SwitchingComputer Network
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
    • by 
    •   15  
      Computer ScienceDistributed ComputingCongestion ControlFlow Control
We studied Brute-force SSH attacks carried out on six different universities campus networks by using Honeypot Techniques. Brute-force password guessing attacks against SSH, FTP and telnet servers are the most common form of attack to... more
    • by 
    •   11  
      Computer ScienceNetwork SecurityComputer SecurityHoneypot
This paper introduces JitterBugs, a class of inline interception mechanisms that covertly transmit data by perturbing the timing of input events likely to affect externally observable network traffic. JitterBugs positioned at input... more
    • by 
    •   7  
      Computer ScienceEncryptionComputer NetworkBotnet