Sciweavers

273 search results - page 20 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
76
Voted
PAM
2005
Springer
15 years 3 months ago
Evaluating the Accuracy of Captured Snapshots by Peer-to-Peer Crawlers
The increasing popularity of Peer-to-Peer (P2P) networks has led to growing interest in characterizing their topology and dynamics [1–4], essential for proper design and effecti...
Daniel Stutzbach, Reza Rejaie
DSN
2009
IEEE
15 years 4 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
80
Voted
IMC
2004
ACM
15 years 3 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
89
Voted
CCS
2010
ACM
14 years 9 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 9 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan