Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
This paper describes design and implementation of L ATM, an ATM (Asynchronous Transfer Mode) based networking server. While ATM emphasizes deterministic highspeed communication, a...
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...