Sciweavers

5234 search results - page 192 / 1047
» Simulation of Computer Network Attacks
Sort
View
93
Voted
NSPW
2006
ACM
15 years 8 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon
AIMS
2010
Springer
15 years 3 months ago
Towards Flexible and Secure Distributed Aggregation
Distributed aggregation algorithms are important in many present and future computing applications. However, after a decade of research, there are still numerous open questions reg...
Kristján Valur Jónsson, Mads F. Dam
CCR
2005
97views more  CCR 2005»
15 years 2 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
RAID
1999
Springer
15 years 6 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
123
Voted
CAMAD
2009
IEEE
15 years 7 months ago
SSSim: a Simple and Scalable Simulator for P2P Streaming Systems
This paper describes SSSim, the Simple and Scalable Simulator for P2P streaming systems. SSSim is designed for performance and scalability, and allows the simulation of the diffus...
Luca Abeni, Csaba Király, Renato Lo Cigno