Sciweavers

230 search results - page 27 / 46
» host 2009
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
PDP
2009
IEEE
14 years 2 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
AOSD
2009
ACM
14 years 2 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...
SIGCSE
2009
ACM
183views Education» more  SIGCSE 2009»
14 years 2 months ago
Enhancing undergraduate education: a REU model for interdisciplinary research
This paper presents a successful model for undergraduate research where student participants work on interdisciplinary research projects; in our case, at the frontier between comp...
Daniela Stan Raicu, Jacob D. Furst
PAM
2009
Springer
14 years 2 months ago
Quantifying the Extent of IPv6 Deployment
Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety ...
Elliott Karpilovsky, Alexandre Gerber, Dan Pei, Je...