Sciweavers

147 search results - page 20 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
RAID
2010
Springer
13 years 5 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...
IJON
2006
68views more  IJON 2006»
13 years 7 months ago
Dendritic cable with active spines: A modelling study in the spike-diffuse-spike framework
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modelled with a simple integrate-and-fire process, whil...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
GLOBECOM
2008
IEEE
13 years 7 months ago
Correlation Among Piecewise Unwanted Traffic Time Series
In this paper, we investigate temporal and spatial correlations of time series of unwanted traffic (i.e., darknet or network telescope traffic) in order to estimate statistical beh...
Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Tosh...
TIST
2011
136views more  TIST 2011»
13 years 2 months ago
Probabilistic models for concurrent chatting activity recognition
Recognition of chatting activities in social interactions is useful for constructing human social networks. However, the existence of multiple people involved in multiple dialogue...
Jane Yung-jen Hsu, Chia-chun Lian, Wan-rong Jih