Sciweavers

415 search results - page 44 / 83
» Discovering communities in complex networks
Sort
View
ACSAC
2010
IEEE
12 years 11 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
SIGIR
2008
ACM
13 years 8 months ago
Efficient top-k querying over social-tagging networks
Online communities have become popular for publishing and searching content, as well as for finding and connecting to other users. User-generated content includes, for example, pe...
Ralf Schenkel, Tom Crecelius, Mouna Kacimi, Sebast...
NDSS
2008
IEEE
14 years 2 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
ICCS
2009
Springer
14 years 2 months ago
Simulating Individual-Based Models of Epidemics in Hierarchical Networks
Current mathematical modeling methods for the spreading of infectious diseases are too simplified and do not scale well. We present the Simulator of Epidemic Evolution in Complex ...
Rick Quax, David A. Bader, Peter M. A. Sloot
ICDCSW
2006
IEEE
14 years 2 months ago
Concurrency Tradeoffs in Dynamic Adaptation
Software systems need to adapt as requirements change, environment conditions vary, and bugs are discovered and fixed. In context of verification of these adaptive systems, the ...
Karun N. Biyani, Sandeep S. Kulkarni