Sciweavers

63 search results - page 12 / 13
» Modeling and analysis of worm interactions (war of the worms...
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 5 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
DIMVA
2007
13 years 7 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
JCO
2006
67views more  JCO 2006»
13 years 5 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
CHI
2010
ACM
14 years 19 days ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan
BMCBI
2007
116views more  BMCBI 2007»
13 years 5 months ago
Cloning, analysis and functional annotation of expressed sequence tags from the Earthworm Eisenia fetida
Background: Eisenia fetida, commonly known as red wiggler or compost worm, belongs to the Lumbricidae family of the Annelida phylum. Little is known about its genome sequence alth...
Mehdi Pirooznia, Ping Gong, Xin Guan, Laura S. Ino...