Sciweavers

4922 search results - page 32 / 985
» Internet time out
Sort
View
DSN
2004
IEEE
14 years 12 days ago
Dynamic Quarantine of Internet Worms
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
IM
2003
13 years 10 months ago
Towards XML Oriented Internet Management
: Internet Management is based on IETF specifications that have been developed and used during the past 14 years: There are multiple versions and options of the management protoco...
Frank Strauß, Torsten Klie
VIROLOGY
2008
68views more  VIROLOGY 2008»
13 years 8 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...
TON
2010
89views more  TON 2010»
13 years 7 months ago
Demand-aware content distribution on the internet
—The rapid growth of media content distribution on the Internet in the past few years has brought with it commensurate increases in the costs of distributing that content. Can th...
Srinivas Shakkottai, Ramesh Johari
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 3 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton