Sciweavers

499 search results - page 12 / 100
» A Study on Latent Vulnerabilities
Sort
View
81
Voted
ICN
2009
Springer
15 years 4 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ACMSE
2006
ACM
15 years 3 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
80
Voted
ACSAC
2004
IEEE
15 years 1 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
TSP
2010
14 years 4 months ago
Selection policy-induced reduction mappings for Boolean networks
Developing computational models paves the way to understanding, predicting, and influencing the long-term behavior of genomic regulatory systems. However, several major challenges ...
Ivan Ivanov, Plamen Simeonov, Noushin Ghaffari, Xi...
79
Voted
CSMR
2006
IEEE
15 years 3 months ago
Can LSI help Reconstructing Requirements Traceability in Design and Test?
Managing traceability data is an important aspect of the software development process. In this paper we investigate to what extent latent semantic indexing (LSI), an information r...
Marco Lormans, Arie van Deursen