Login / Signup
King: estimating latency between arbitrary internet end hosts.
P. Krishna Gummadi
Stefan Saroiu
Steven D. Gribble
Published in:
Comput. Commun. Rev. (2002)
Keyphrases
</>
end hosts
network security
denial of service attacks
campus network
database systems
traffic analysis
ip addresses
intrusion detection
computer networks
node failures
response time
anomaly detection