Login / Signup

King: estimating latency between arbitrary internet end hosts.

P. Krishna GummadiStefan SaroiuSteven D. Gribble
Published in: Comput. Commun. Rev. (2002)
Keyphrases
  • end hosts
  • network security
  • denial of service attacks
  • campus network
  • database systems
  • traffic analysis
  • ip addresses
  • intrusion detection
  • computer networks
  • node failures
  • response time
  • anomaly detection