Sciweavers

832 search results - page 26 / 167
» Effect of Malicious Synchronization
Sort
View
CCS
2010
ACM
13 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
ITICSE
2004
ACM
14 years 3 months ago
Evaluating the effectiveness of ICT to support globally distributed PBL teams
In the 21st century it is becoming increasingly common to work and learn in teams that are globally distributed. Such teams rely heavily on ICT to facilitate communication. There ...
Chew Swee Cheng, Chris Beaumont
DSN
2009
IEEE
14 years 4 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
CSFW
2002
IEEE
14 years 2 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
SIGSOFT
2010
ACM
13 years 7 months ago
An effective dynamic analysis for detecting generalized deadlocks
We present an effective dynamic analysis for finding a broad class of deadlocks, including the well-studied lock-only deadlocks as well as the less-studied, but no less widespread...
Pallavi Joshi, Mayur Naik, Koushik Sen, David Gay