Sciweavers

499 search results - page 77 / 100
» A Study on Latent Vulnerabilities
Sort
View
IPTPS
2005
Springer
15 years 6 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
IMC
2004
ACM
15 years 5 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
120
Voted
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 5 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
84
Voted
HICSS
2002
IEEE
121views Biometrics» more  HICSS 2002»
15 years 5 months ago
Internet Banking: A Customer-Centric Perspective
Many financial institutions are actively developing new electronic banking products for their retail customers. These efforts are can succeed only if their managers focus the prom...
Don Sciglimpaglia, David Ely
COLCOM
2009
IEEE
15 years 5 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño