Sciweavers

2503 search results - page 134 / 501
» Building Computer Network Attacks
Sort
View
ICCSA
2007
Springer
15 years 4 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
NCA
2009
IEEE
15 years 4 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
NBIS
2010
Springer
14 years 8 months ago
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada
DCOSS
2006
Springer
15 years 1 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
CCGRID
2007
IEEE
15 years 4 months ago
Assessing the Quality of Automatically Built Network Representations
Abstract— In order to efficiently use Grid resources, users or middlewares must use some network information, and in particular some knowledge of the platform network. As such kn...
Lionel Eyraud-Dubois, Martin Quinson