Sciweavers

5665 search results - page 1057 / 1133
» Introduction to Computer Security
Sort
View
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
13 years 7 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SIGOPS
2010
272views more  SIGOPS 2010»
13 years 7 months ago
The Akamai network: a platform for high-performance internet applications
Comprising more than 61,000 servers located across nearly 1,000 networks in 70 countries worldwide, the Akamai platform delivers hundreds of billions of Internet interactions dail...
Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
IMC
2010
ACM
13 years 6 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
« Prev « First page 1057 / 1133 Last » Next »