Sciweavers

205 search results - page 8 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
AAAI
2006
13 years 10 months ago
Domain-Independent Structured Duplicate Detection
The scalability of graph-search algorithms can be greatly extended by using external memory, such as disk, to store generated nodes. We consider structured duplicate detection, an...
Rong Zhou, Eric A. Hansen
ATAL
2009
Springer
14 years 3 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 5 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ICONIP
2008
13 years 10 months ago
Neurocognitive Approach to Creativity in the Domain of Word-Invention
One of the simplest creative act is the invention of a new word that captures some characteristics of objects or processes, for example industrial or software products, activity of...
Maciej Pilichowski, Wlodzislaw Duch
IEEEIAS
2009
IEEE
14 years 3 months ago
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks
A computer worm is an autonomous malicious, selfreplicating and propagating piece of code that is able to spread fast in computer networks, exploiting the vulnerabilities it disco...
Pantelis Kammas, Thodoros Komninos, Yannis C. Stam...