Sciweavers

734 search results - page 126 / 147
» A Novel Quantitative Approach For Measuring Network Security
Sort
View
OSDI
2004
ACM
15 years 10 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
TON
2012
13 years 1 days ago
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow
—The inherent measurement support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problem...
Myungjin Lee, Nick G. Duffield, Ramana Rao Kompell...
86
Voted
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
CCS
2006
ACM
15 years 1 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
CMOT
2002
112views more  CMOT 2002»
14 years 9 months ago
Finding Optimal Targets for Change Agents: A Computer Simulation of Innovation Diffusion
We introduce a diffusion of innovation model based on a network threshold approach. Realistic network and threshold data were gathered regarding the diffusion of new software tool...
Dirk Maienhofer, Thomas A. Finholt