Sciweavers

55 search results - page 8 / 11
» worm 2004
Sort
View
IMC
2004
ACM
13 years 11 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
ISSA
2004
13 years 7 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
RAID
2004
Springer
13 years 11 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
ICCAD
2004
IEEE
135views Hardware» more  ICCAD 2004»
14 years 3 months ago
Soft self-synchronising codes for self-calibrating communication
Self-calibrating designs are gaining momentum in both the computation and communication worlds. Instead of relying on the worst-case characterisation of design parameters, self-ca...
Frederic Worm, Paolo Ienne, Patrick Thiran
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 3 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee