Sciweavers

147 search results - page 21 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
ICPR
2010
IEEE
13 years 10 months ago
Image Parsing with a Three-State Series Neural Network Classifier
We propose a three-state series neural network for effective propagation of context and uncertainty information for image parsing. The activation functions used in the proposed mod...
Seyed Mojtaba Seyedhosseini Tarzjani, Antonio Paiv...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
FPL
2004
Springer
171views Hardware» more  FPL 2004»
14 years 26 days ago
A Modular System for FPGA-Based TCP Flow Processing in High-Speed Networks
Field Programmable Gate Arrays (FPGAs) can be used in Intrusion Prevention Systems (IPS) to inspect application data contained within network flows. An IPS operating on high-speed...
David V. Schuehler, John W. Lockwood
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long