Sciweavers

3534 search results - page 666 / 707
» On Structural Analysis of Large Networks
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Gossiping with Multiple Messages
Abstract— This paper investigates the dissemination of multiple pieces of information in large networks where users contact each other in a random uncoordinated manner, and users...
Sujay Sanghavi, Bruce Hajek, Laurent Massouli&eacu...
ACSAC
2006
IEEE
14 years 2 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
INFOCOM
2006
IEEE
14 years 2 months ago
Routers with Very Small Buffers
Abstract— Internet routers require buffers to hold packets during times of congestion. The buffers need to be fast, and so ideally they should be small enough to use fast memory ...
Mihaela Enachescu, Yashar Ganjali, Ashish Goel, Ni...
IPCCC
2006
IEEE
14 years 2 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
NDSS
2006
IEEE
14 years 2 months ago
Modeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated...
David Dagon, Cliff Changchun Zou, Wenke Lee