Sciweavers

25 search results - page 5 / 5
» worm 2003
Sort
View
SPIESR
2003
165views Database» more  SPIESR 2003»
13 years 6 months ago
Analysis of musical expression in audio signals
In western art music, composers communicate their work to performers via a standard notation which specificies the musical pitches and relative timings of notes. This notation ma...
Simon Dixon
USS
2004
13 years 6 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
INFOCOM
2003
IEEE
13 years 10 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
MINENET
2006
ACM
13 years 11 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
13 years 10 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich