Sciweavers

1663 search results - page 283 / 333
» Computer Security in the Real World
Sort
View
DSN
2007
IEEE
15 years 7 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...
EUC
2007
Springer
15 years 7 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
PERVASIVE
2008
Springer
15 years 3 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 3 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
RAID
2010
Springer
15 years 2 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin