Sciweavers

134 search results - page 14 / 27
» Experiences with worm propagation simulations
Sort
View
INFOCOM
2008
IEEE
14 years 5 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
INFOCOM
2003
IEEE
14 years 4 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
LISA
2007
14 years 1 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
ACSAC
2006
IEEE
14 years 5 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ICRA
2007
IEEE
151views Robotics» more  ICRA 2007»
14 years 5 months ago
Polychaete-like Pedundulatory Robotic Locomotion
— The polychaete annelid marine worms propel themselves in a variety of challenging locomotion environments by a unique form of tail-to-head body undulations, combined with the s...
Michael Sfakiotakis, Dimitris P. Tsakiris, Kostas ...