Sciweavers

247 search results - page 40 / 50
» Worm anatomy and model
Sort
View
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
HOLOMAS
2007
Springer
14 years 2 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
CCS
2008
ACM
13 years 10 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
MICCAI
1998
Springer
14 years 15 days ago
Constrained Elastic Surface Nets: Generating Smooth Surfaces from Binary Segmented Data
This paper describes a method for creating object surfaces from binary-segmented data that are free from aliasing and terracing artifacts. In this method, a net of linked surface n...
Sarah F. Frisken Gibson