Sciweavers

381 search results - page 16 / 77
» host 2008
Sort
View
CEC
2008
IEEE
14 years 2 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ELPUB
2008
ACM
13 years 9 months ago
The Role of Academic Libraries in Building Open Communities of Scholars
This paper describes three important pillars of publishing programs emerging at university libraries: providing a robust publishing platform, engaging the academic community in di...
Kevin Stranack, Gwen Bird, Rea Devakos
NDSS
2008
IEEE
14 years 1 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
GLOBECOM
2008
IEEE
14 years 2 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
NDSS
2008
IEEE
14 years 1 months ago
Measuring and Detecting Fast-Flux Service Networks
We present the first empirical study of fast-flux service networks (FFSNs), a newly emerging and still not widelyknown phenomenon in the Internet. FFSNs employ DNS to establish ...
Thorsten Holz, Christian Gorecki, Konrad Rieck, Fe...