Sciweavers

88 search results - page 16 / 18
» A study of mass-mailing worms
Sort
View
ICDM
2007
IEEE
175views Data Mining» more  ICDM 2007»
15 years 3 months ago
gApprox: Mining Frequent Approximate Patterns from a Massive Network
Recently, there arise a large number of graphs with massive sizes and complex structures in many new applications, such as biological networks, social networks, and the Web, deman...
Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han
HUC
2007
Springer
15 years 3 months ago
Exploiting Social Interactions in Mobile Systems
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...
ICICS
2007
Springer
15 years 3 months ago
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Autonomous spreading malware in the form of worms or bots has become a severe threat in today’s Internet. Collecting the sample as early as possible is a necessary precondition f...
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu ...
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
IOLTS
2006
IEEE
103views Hardware» more  IOLTS 2006»
15 years 3 months ago
Designing Robust Checkers in the Presence of Massive Timing Errors
So far, performance and reliability of circuits have been determined by worst-case characterization of silicon and environmental noise. As new deep sub-micron technologies exacerb...
Frederic Worm, Patrick Thiran, Paolo Ienne