Sciweavers

9 search results - page 1 / 2
» Scalable Detection and Isolation of Phishing
Sort
View
AIMS
2009
Springer
13 years 11 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
SEMWEB
2009
Springer
13 years 11 months ago
Scalable Matching of Industry Models - a Case Study
A recent approach to the problem of ontology matching has been to convert the problem of ontology matching to information retrieval. We explore the utility of this approach in matc...
Brian Byrne, Achille Fokoue, Aditya Kalyanpur, Kav...
SECON
2008
IEEE
13 years 11 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
DSOM
2000
Springer
13 years 8 months ago
A Scalable Architecture for Monitoring and Visualizing Multicast Statistics
An understanding of certain network functions is critical for successful network management. Managers must have insight into network topology, protocol performance and fault detec...
Prashant Rajvaidya, Kevin C. Almeroth, Kimberly C....
ICNP
2000
IEEE
13 years 9 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang