Sciweavers

2503 search results - page 266 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2010
ACM
15 years 10 days ago
Robopedia: Leveraging Sensorpedia for web-enabled robot control
Abstract— There is a growing interest in building Internetscale sensor networks that integrate sensors from around the world into a single unified system. In contrast, robotics ...
Richard Edwards, Lynne E. Parker, David Resseguie
BPSC
2007
202views Business» more  BPSC 2007»
15 years 3 months ago
Towards Autonomic Processes and Services
More than ever, computing devices are becoming more powerful and networked, organizational boundaries are dissolving, and underlying information systems become more complex, thus r...
Schahram Dustdar
123
Voted
PERCOM
2010
ACM
15 years 5 months ago
Zero-knowledge real-time indoor tracking via outdoor wireless directional antennas
—WiFi localization and tracking of indoor moving objects is an important problem in many contexts of ubiquitous buildings, first responder environments, and others. Previous app...
Thadpong Pongthawornkamol, Shameem Ahmed, Klara Na...
DSN
2006
IEEE
15 years 8 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
NSDI
2008
15 years 4 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...