Sciweavers

15 search results - page 3 / 3
» Analyzing the spread of active worms over VANET
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 10 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
IMC
2004
ACM
14 years 2 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
14 years 2 months ago
Towards Visual Exploration of Topic Shifts
— This paper presents two approaches to visually analyze the topic shift of a pool of documents over a given period of time. The first of the proposed methods is based on a mult...
Kilian Thiel, Fabian Dill, Tobias Kötter, Mic...
ASUNAM
2009
IEEE
14 years 3 months ago
An Analytical Way to Find Influencers on Social Networks and Validate their Effects in Disseminating Social Games
As the weight of online social networks (OSNs) which provide powerful means of sharing common interests and communicating has gradually grown up, influencers are also given the gr...
Erica Suyeon Kim, Steve SangKi Han
NSDI
2004
13 years 10 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy