Sciweavers

192 search results - page 32 / 39
» An autonomous explore exploit strategy
Sort
View
SECON
2007
IEEE
14 years 3 months ago
A Framework for Resilient Online Coverage in Sensor Networks
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
CEAS
2007
Springer
14 years 3 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
HUC
2007
Springer
14 years 3 months ago
Addressing Mobile Phone Diversity in Ubicomp Experience Development
Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However m...
Chris Greenhalgh, Steve Benford, Adam Drozd, Marti...
ACSAC
2006
IEEE
14 years 3 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
IPTPS
2005
Springer
14 years 2 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...