Sciweavers

382 search results - page 61 / 77
» Tracing Network Attacks to Their Sources
Sort
View
DIMVA
2006
13 years 9 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 15 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
PVLDB
2008
104views more  PVLDB 2008»
13 years 7 months ago
Scalable multi-query optimization for exploratory queries over federated scientific databases
The diversity and large volumes of data processed in the Natural Sciences today has led to a proliferation of highlyspecialized and autonomous scientific databases with inherent a...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...
GLOBECOM
2006
IEEE
14 years 1 months ago
AS Path Inference by Exploiting Known AS Paths
Abstract— Inferring AS-level end-to-end paths can be a valuable tool for both network operators and researchers. A widely known technique for inferring end-to-end paths is to per...
Jian Qiu, Lixin Gao