Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency---especially the tail of the latency distribution …
L Xue, X Ma, X Luo, EWW Chan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A new class of target link flooding attacks (LFAs) can cut off the Internet connections of a target area without being detected, because they employ legitimate flows to congest …
L Xue, X Luo, EWW Chan, X Zhan - 28th Large Installation System …, 2014 - usenix.org
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected …
EWW Chan, X Luo, WWT Fok, W Li… - Passive and Active …, 2011 - Springer
Submarine cable faults are not uncommon events in the Internet today. However, their impacts on end-to-end path quality have received almost no attention. In this paper, we …
Wide-area Internet links are slow, expensive, and unreliable. This affects applications in two distinct ways. Back-end data processing applications, which need to transfer large amounts …
BB Halis, F Wiedner, M Helm - Network, 2022 - net.in.tum.de
Network path monitoring is an important feature of modern networks. It enables to understand the behavior of the network. However, a network is a complex structure, and …
L Xue, Z Liu, X Zou, J Hou, LUO Xiapu… - US Patent …, 2019 - Google Patents
It is described a network attack detection method. A topol ogy analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing …
L Xue, Z Liu, X Zou, J Hou, LUO Xiapu… - US Patent …, 2018 - Google Patents
It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing …