Sciweavers

2503 search results - page 318 / 501
» Building Computer Network Attacks
Sort
View
RAID
2004
Springer
15 years 7 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
CSREASAM
2006
15 years 3 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
IMSCCS
2006
IEEE
15 years 7 months ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
78
Voted
SAC
2008
ACM
15 years 1 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
WWW
2008
ACM
16 years 2 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu