Sciweavers

186 search results - page 31 / 38
» On the use of anycast in DNS
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 3 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
INFOSCALE
2006
ACM
14 years 2 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 16 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
JCM
2007
68views more  JCM 2007»
13 years 8 months ago
Cost-effective Product Traceability System Based on Widely Distributed Databases
— A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems...
Shirou Wakayama, Yusuke Doi, Satoshi Ozaki, Atsush...
IMC
2010
ACM
13 years 6 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov