Sciweavers

295 search results - page 30 / 59
» Differentially-private network trace analysis
Sort
View
RAID
2009
Springer
14 years 4 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
ICDCSW
2008
IEEE
14 years 4 months ago
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach
Research on delay tolerant networks (DTNs) has brought about a plethora of routing algorithms targeted at networks with different mobility patterns. However, few research works ha...
Yifeng Shao, Jie Wu
HUC
2010
Springer
13 years 11 months ago
Bridging the gap between physical location and online social networks
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of ...
Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket ...
WICON
2010
13 years 8 months ago
On Infostation Density of Vehicular Networks
Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular netwo...
Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, B...