Sciweavers

42 search results - page 7 / 9
» Exploiting the Physical Environment for Securing the Interne...
Sort
View
SEMWEB
2009
Springer
13 years 10 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
IMC
2009
ACM
14 years 9 days ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
RAID
2005
Springer
13 years 11 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
SAC
2000
ACM
13 years 10 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
VRML
2004
ACM
13 years 11 months ago
Automatic derivation of electronic maps from X3D/VRML worlds
Maps of physical environments and geographical areas are pervasively exploited in many human activities. Electronic maps of virtual worlds have been studied and proven to be usefu...
Lucio Ieronutti, Roberto Ranon, Luca Chittaro