Sciweavers

1004 search results - page 201 / 201
» Modeling internet topology dynamics
Sort
View
CN
2004
95views more  CN 2004»
13 years 4 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
IJAIT
2002
92views more  IJAIT 2002»
13 years 4 months ago
Extensible Information Brokers
The number and size of information services available on the internet has been growing exponentially over the past few years. This growth has created an urgent need for information...
Jianguo Lu, John Mylopoulos
USS
2010
13 years 2 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
TIP
2010
117views more  TIP 2010»
12 years 11 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu