Sciweavers

482 search results - page 54 / 97
» A taxonomy of computer worms
Sort
View
ICDCS
2010
IEEE
14 years 21 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
APNOMS
2006
Springer
14 years 16 days ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
ICITS
2011
13 years 7 days ago
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
Yongge Wang, Yvo Desmedt
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Automatic Classification of Photographs and Graphics
In general, digital images can be classified into photographs and computer graphics. This taxonomy is very useful in many applications, such as web image search. However, there ar...
Yuanhao Chen, Zhiwei Li, Mingjing Li, Wei-Ying Ma
CODES
2003
IEEE
14 years 2 months ago
Transaction level modeling: an overview
Recently, the transaction-level modeling has been widely referred to in system-level design community. However, the transaction-level models(TLMs) are not well defined and the us...
Lukai Cai, Daniel Gajski