%PDF-1.4
%
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction)
endobj
5 0 obj
<< /S /GoTo /D (section.2) >>
endobj
8 0 obj
(Background)
endobj
9 0 obj
<< /S /GoTo /D (section.3) >>
endobj
12 0 obj
(Preliminaries)
endobj
13 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
16 0 obj
(Network model)
endobj
17 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
20 0 obj
(Dynamics of TCP)
endobj
21 0 obj
<< /S /GoTo /D (section.4) >>
endobj
24 0 obj
(Analysis of Coremelt attack)
endobj
25 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
28 0 obj
(Attack with TCP-NewReno)
endobj
29 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
32 0 obj
(Attack with a modified TCP)
endobj
33 0 obj
<< /S /GoTo /D (section.5) >>
endobj
36 0 obj
(Mitigation)
endobj
37 0 obj
<< /S /GoTo /D (section.6) >>
endobj
40 0 obj
(Simulation Results)
endobj
41 0 obj
<< /S /GoTo /D (section.7) >>
endobj
44 0 obj
(Conclusion)
endobj
45 0 obj
<< /S /GoTo /D (section*.1) >>
endobj
48 0 obj
(References)
endobj
49 0 obj
<< /S /GoTo /D [50 0 R /Fit] >>
endobj
61 0 obj
<<
/Length 4749
/Filter /FlateDecode
>>
stream
xڵ:rƱ}I0Ņ1y #Y6]1#q=`Y.1קoXKN)3==(VO3q l
>o--y?<;7%qza `=B7 |bF浿k^W͢S쓆>MՌsn|DW<7sӔ#FM_=wn'Poixi[^?X
uʛCr(q wS^4,oV6V/nQMfqGhͮ5! *z\~rUq<jy9'awa,+sD"C95! 9Otry^ж%siqХ uS5=ٔ|
ޛ!}~
\I<>H>
^SUmN|)=<-9a'ӗEm1>~a&͢vҺN?