Sciweavers

240 search results - page 31 / 48
» Malicious Users in Unstructured Networks
Sort
View
ICPADS
2008
IEEE
14 years 1 months ago
Delaunay State Management for Large-Scale Networked Virtual Environments
Peer-to-Peer (P2P) networks have been proposed as a promising approach to create more scalable Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probabil...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang
DSN
2007
IEEE
13 years 11 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
FPL
2001
Springer
92views Hardware» more  FPL 2001»
13 years 12 months ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean
NDSS
2003
IEEE
14 years 23 days ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
ASUNAM
2009
IEEE
14 years 18 days ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...