Sciweavers

5234 search results - page 83 / 1047
» Simulation of Computer Network Attacks
Sort
View
NIPS
2004
13 years 10 months ago
Edge of Chaos Computation in Mixed-Mode VLSI - A Hard Liquid
Computation without stable states is a computing paradigm different from Turing's and has been demonstrated for various types of simulated neural networks. This publication t...
Felix Schürmann, Karlheinz Meier, Johannes Sc...
WWW
2002
ACM
14 years 9 months ago
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...
Jaeyeon Jung, Balachander Krishnamurthy, Michael R...
RAID
1999
Springer
14 years 1 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
TSMC
2010
13 years 3 months ago
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, mali...
Feng Li, Yinying Yang, Jie Wu
GLOBECOM
2010
IEEE
13 years 7 months ago
GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers
Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with th...
Dzmitry Kliazovich, Pascal Bouvry, Yury Audzevich,...