Sciweavers

5234 search results - page 62 / 1047
» Simulation of Computer Network Attacks
Sort
View
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 3 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
DIMVA
2011
13 years 19 days ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
PERCOM
2009
ACM
14 years 9 months ago
DiaSim: A Parameterized Simulator for Pervasive Computing Applications
Abstract--Pervasive computing applications involve both software concerns, like any software system, and integration concerns, for the constituent networked devices of the pervasiv...
Wilfried Jouve, Julien Bruneau, Charles Consel
RAID
2000
Springer
14 years 20 days ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
MIG
2009
Springer
14 years 3 months ago
Real-Time Character Control for Wrestling Games
This paper proposes a method to simulate the real-time interactions of tangling motions by two virtual wrestlers in 3D computer games. The characters are controlled individually by...
Edmond S. L. Ho, Taku Komura