Sciweavers

1278 search results - page 205 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
HCW
1999
IEEE
14 years 1 months ago
Multiple Cost Optimization for Task Assignment in Heterogeneous Computing Systems Using Learning Automata
A framework for task assignment in heterogeneous computing systems is presented in this work. The framework is based on a learning automata model. The proposed model can be used f...
Raju D. Venkataramana, N. Ranganathan
AI
2010
Springer
14 years 16 days ago
Automatic Discovery of Network Applications: A Hybrid Approach
Automatic discovery of network applications is a very challenging task which has received a lot of attentions due to its importance in many areas such as network security, QoS prov...
Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. ...
EUROSYS
2008
ACM
14 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
ACSAC
2009
IEEE
14 years 3 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...