Sciweavers

1356 search results - page 245 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
RAID
2004
Springer
14 years 1 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
SCFBM
2008
138views more  SCFBM 2008»
13 years 7 months ago
Epigrass: a tool to study disease spread in complex networks
Background: The construction of complex spatial simulation models such as those used in network epidemiology, is a daunting task due to the large amount of data involved in their ...
Flávio C. Coelho, Oswaldo G. Cruz, Cl&aacut...
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
11 years 10 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
INFOCOM
2008
IEEE
14 years 2 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
NETGAMES
2003
ACM
14 years 1 months ago
Bandwidth requirement and state consistency in three multiplayer game architectures
Abstract— Multiplayer games become increasingly popular, mostly because they involve interaction among humans. Typically, multiplayer games are organized based on a Client-Server...
Joseph D. Pellegrino, Constantinos Dovrolis