Sciweavers

122 search results - page 2 / 25
» Re-wiring Activity of Malicious Networks
Sort
View
ACSAC
2009
IEEE
14 years 11 days ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
WEBI
2009
Springer
14 years 4 days ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
IWAN
2004
Springer
13 years 11 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
AINA
2010
IEEE
13 years 9 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
ALGOSENSORS
2009
Springer
13 years 10 months ago
On Active Attacks on Sensor Network Key Distribution Schemes
This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attack...
Stefan Dziembowski, Alessandro Mei, Alessandro Pan...