Sciweavers

280 search results - page 7 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
NLE
2010
218views more  NLE 2010»
13 years 6 months ago
Automatic discovery of word semantic relations using paraphrase alignment and distributional lexical semantics analysis
Thesauri, that list the most salient semantic relations between words have mostly been compiled manually. Therefore, the inclusion of an entry depends on the subjective decision o...
Gaël Dias, Rumen Moraliyski, João Cord...
IJSN
2007
73views more  IJSN 2007»
13 years 7 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
HPCA
2009
IEEE
14 years 8 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng
INFOCOM
2002
IEEE
14 years 17 days ago
Analysis of Measured Single-Hop Delay from an Operational Backbone Network
— We measure and analyze the single-hop packet delay through operational routers in a backbone IP network. First we present our delay measurements through a single router. Then w...
Konstantina Papagiannaki, Sue B. Moon, Chuck Frale...