Sciweavers

1970 search results - page 373 / 394
» Security Without Firewalls
Sort
View
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
IMC
2006
ACM
14 years 1 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
IMC
2006
ACM
14 years 1 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
MOBIWAC
2006
ACM
14 years 1 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...