Sciweavers

78 search results - page 14 / 16
» Improving stream correlation attacks on anonymous networks
Sort
View
PERCOM
2010
ACM
13 years 5 months ago
Predicting mobility events on personal devices
High-end mobile phones are quickly becoming versatile sensing platforms, capable of continuously capturing the dynamic context of their owners through various sensors. A change in...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
RAID
2004
Springer
14 years 23 days ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
DSOM
2003
Springer
14 years 19 days ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
ACSAC
2003
IEEE
13 years 11 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
IPTPS
2005
Springer
14 years 28 days ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...