Sciweavers

162 search results - page 25 / 33
» A NetFlow based internet-worm detecting system in large netw...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
IWCMC
2010
ACM
14 years 15 days ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
IPPS
2008
IEEE
14 years 1 months ago
SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale
We present SNAP (Small-world Network Analysis and Partitioning), an open-source graph framework for exploratory study and partitioning of large-scale networks. To illustrate the c...
David A. Bader, Kamesh Madduri
TELETRAFFIC
2007
Springer
14 years 1 months ago
Adaptive Congestion Control Under Dynamic Weather Condition for Wireless and Satellite Networks
Broadband satellite-based IP networks have been considered as the technology to enable a strong and promising next-generation market. In satellite communication systems, the channe...
Hongqing Zeng, Anand Srinivasan, Brian Cheng, Chan...
TIP
2008
144views more  TIP 2008»
13 years 7 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras