Sciweavers

482 search results - page 58 / 97
» A taxonomy of computer worms
Sort
View
HUC
2007
Springer
14 years 3 months ago
Exploiting Social Interactions in Mobile Systems
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...
DSN
2006
IEEE
14 years 2 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
SYNASC
2005
IEEE
97views Algorithms» more  SYNASC 2005»
14 years 2 months ago
A Reinforcement Learning Algorithm for Spiking Neural Networks
The paper presents a new reinforcement learning mechanism for spiking neural networks. The algorithm is derived for networks of stochastic integrate-and-fire neurons, but it can ...
Razvan V. Florian
DSN
2007
IEEE
14 years 22 days ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
EUC
2007
Springer
14 years 21 days ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...