Sciweavers

19 search results - page 4 / 4
» An introduction to investigating IPv6 networks
Sort
View
INFOCOM
2007
IEEE
14 years 21 days ago
Measuring Network-Aware Worm Spreading Ability
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
Zesheng Chen, Chuanyi Ji
AINA
2010
IEEE
13 years 11 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 6 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CHI
2009
ACM
14 years 7 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios