Sciweavers

482 search results - page 49 / 97
» A taxonomy of computer worms
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
BROADNETS
2006
IEEE
14 years 2 months ago
A Secure Programming Paradigm for Network Virtualization
—The central paradigm of today’s successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm li...
Ana Milanova, Sonia Fahmy, David Musser, Büle...
DATE
2002
IEEE
161views Hardware» more  DATE 2002»
14 years 1 months ago
Hardware/Software Trade-Offs for Advanced 3G Channel Coding
Third generation’s wireless communications systems comprise advanced signal processing algorithms that increase the computational requirements more than ten-fold over 2G’s sys...
Heiko Michel, Alexander Worm, Norbert Wehn, Michae...
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 9 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
CHI
2003
ACM
14 years 9 months ago
When one isn't enough: an analysis of virtual desktop usage strategies and their implications for design
Screen space is a limited resource for computer users-multiple monitors are one means of workspace expansion, and "virtual desktops" are yet another way to increase scre...
Meredith Ringel