Sciweavers

138 search results - page 27 / 28
» Damage control
Sort
View
ECRIME
2007
14 years 14 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
CMS
2006
13 years 10 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
WORM
2003
13 years 10 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
BMCBI
2007
86views more  BMCBI 2007»
13 years 8 months ago
Toxicogenomic analysis incorporating operon-transcriptional coupling and toxicant concentration-expression response: analysis of
Background: Deficiencies in microarray technology cause unwanted variation in the hybridization signal, obscuring the true measurements of intracellular transcript levels. Here we...
William O. Ward, Carol D. Swartz, Steffen Porwolli...
CN
2010
120views more  CN 2010»
13 years 8 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan