Sciweavers

1791 search results - page 291 / 359
» Behavioral Operations
Sort
View
130
Voted
IMC
2006
ACM
15 years 8 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
139
Voted
IMC
2006
ACM
15 years 8 months ago
On unbiased sampling for unstructured peer-to-peer networks
This paper addresses the difficult problem of selecting representative samples of peer properties (e.g., degree, link bandwidth, number of files shared) in unstructured peer-to-p...
Daniel Stutzbach, Reza Rejaie, Nick G. Duffield, S...
109
Voted
IMC
2006
ACM
15 years 8 months ago
A measurement-based deployment proposal for IP anycast
Despite its growing use in critical infrastructure services, the performance of IP(v4) Anycast and its interaction with IP routing practices is not well understood. In this paper,...
Hitesh Ballani, Paul Francis, Sylvia Ratnasamy
147
Voted
KBSE
2005
IEEE
15 years 8 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
SIGIR
2005
ACM
15 years 8 months ago
Basic issues on the processing of web queries
Search engines represent a key component of Web economy these days. Despite that, there is not much technical literature available on their design, fine tuning, and internal oper...
Claudine Santos Badue, Ramurti A. Barbosa, Paulo B...