Sciweavers

482 search results - page 75 / 97
» A taxonomy of computer worms
Sort
View
CHI
2011
ACM
13 years 13 days ago
User-defined motion gestures for mobile interaction
Modern smartphones contain sophisticated sensors to monitor three-dimensional movement of the device. These sensors permit devices to recognize motion gestures— deliberate movem...
Jaime Ruiz, Yang Li, Edward Lank
MINENET
2006
ACM
14 years 2 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
PRDC
2005
IEEE
14 years 2 months ago
A Multi-Faceted Approach towards Spam-Resistible Mail
As checking SPAM became part of our daily life, unsolicited bulk e-mails (UBE) have become unmanageable and intolerable. Bulk volume of spam e-mails delivering to mail transfer ag...
Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi C...
CCS
2004
ACM
14 years 2 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CCS
2006
ACM
14 years 18 days ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia