Sciweavers

2503 search results - page 417 / 501
» Building Computer Network Attacks
Sort
View
DSN
2008
IEEE
15 years 8 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
ICNS
2008
IEEE
15 years 8 months ago
Enhancing User-Service Interaction through a Global User-Centric Approach to SOA
Considered as enablers of seamless application-toapplication integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused o...
Javier Soriano, David Lizcano, Juan José Hi...
AINA
2007
IEEE
15 years 7 months ago
DHTs over Peer Clusters for Distributed Information Retrieval
Distributed Hash Tables (DHTs) are very efficient for querying based on key lookups, if only a small number of keys has to be registered by each individual peer. However, building...
Odysseas Papapetrou, Wolf Siberski, Wolf-Tilo Balk...
AINA
2007
IEEE
15 years 7 months ago
Conceptual Framework for a Comprehensive Service Management Middleware
Web services have greatly leveraged the world of Business-to-Business (B2B) communication and promise a lot more through dynamic service composition. In order to compose Web servi...
Farhana H. Zulkernine, Patrick Martin
DSN
2007
IEEE
15 years 7 months ago
Emergent Structure in Unstructured Epidemic Multicast
In epidemic or gossip-based multicast protocols, each node simply relays each message to some random neighbors, such that all destinations receive it at least once with high proba...
Nuno Carvalho, José Pereira, Rui Carlos Oli...