Sciweavers

1737 search results - page 257 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
142
Voted
MOBIHOC
2010
ACM
15 years 14 days ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
103
Voted
DSN
2008
IEEE
15 years 9 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
140
Voted
CEAS
2008
Springer
15 years 4 months ago
Social Honeypots: Making Friends With A Spammer Near You
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
Steve Webb, James Caverlee, Calton Pu
143
Voted
JEI
2008
139views more  JEI 2008»
15 years 2 months ago
Tessella-oriented segmentation and guidelines estimation of ancient mosaic images
Automatic segmentation and analysis of ancient mosaic images can help archaeologists and experts build digital collections and automatically compare mosaics by means of image datab...
Lamia Benyoussef, Stéphane Derrode
139
Voted
JSAC
2007
104views more  JSAC 2007»
15 years 2 months ago
Price dynamics in competitive agile spectrum access markets
— We explore the price dynamics in a competitive market consisting of spectrum agile network service providers and users. Here, multiple self interested spectrum providers operat...
Yiping Xing, Rajarathnam Chandramouli, Carlos de M...