Sciweavers

502 search results - page 70 / 101
» Partial Lookup Service
Sort
View
CCS
2009
ACM
14 years 3 months ago
On cellular botnets: measuring the impact of malicious devices on a cellular network core
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper,...
Patrick Traynor, Michael Lin, Machigar Ongtang, Vi...
ACSAC
2008
IEEE
14 years 3 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ACMICEC
2004
ACM
107views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
Reasoning about commitments in multiple concurrent negotiations
Automated negotiation by software agents is a key enabling technology for agent mediated e-commerce. To this end, this paper considers an important class of such negotiations — ...
Thuc Duong Nguyen, Nicholas R. Jennings
SC
2004
ACM
14 years 2 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
WCW
2004
Springer
14 years 2 months ago
Overhaul: Extending HTTP to Combat Flash Crowds
The increasing use of the web for serving http content, for database transactions, etc. can place heavy stress on servers. Flash crowds can occur at a server when there is a burst ...
Jay A. Patel, Indranil Gupta