Sciweavers

3638 search results - page 27 / 728
» Distribution chain security
Sort
View
WORM
2004
13 years 9 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
ACSAC
2005
IEEE
14 years 1 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
IOR
2010
92views more  IOR 2010»
13 years 6 months ago
Series Expansions for Continuous-Time Markov Processes
We present exchange formulas that allow to express the stationary distribution of a continuous Markov chain with denumerable state-space having generator matrix Q∗ through a con...
Bernd Heidergott, Arie Hordijk, Nicole Leder
TII
2008
132views more  TII 2008»
13 years 7 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
IJIPT
2010
91views more  IJIPT 2010»
13 years 6 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu