Sciweavers

832 search results - page 63 / 167
» Effect of Malicious Synchronization
Sort
View
133
Voted
AAAI
2008
15 years 5 months ago
Minimizing the Spread of Contamination by Blocking Links in a Network
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, a dua...
Masahiro Kimura, Kazumi Saito, Hiroshi Motoda
96
Voted
SNPD
2007
15 years 5 months ago
Parallel analysis of polymorphic viral code using automated deduction system
As malicious code has become more sophisticated and pervasive, faster and more effective system for forensics and prevention is important. Particularly, quick analysis of polymorp...
Ruo Ando
143
Voted
USS
2004
15 years 4 months ago
Very Fast Containment of Scanning Worms
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
Nicholas Weaver, Stuart Staniford, Vern Paxson
126
Voted
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 3 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
109
Voted
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
15 years 3 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...