Sciweavers

12183 search results - page 143 / 2437
» Computers under Attacks!
Sort
View
101
Voted
P2P
2006
IEEE
123views Communications» more  P2P 2006»
15 years 11 months ago
Analytical Study on Improving DHT Lookup Performance under Churn
Di Wu, Ye Tian, Kam-Wing Ng
RTCSA
2005
IEEE
15 years 10 months ago
Utility Accrual Real-Time Scheduling under Variable Cost Functions
Haisang Wu, Umut Balli, Binoy Ravindran, E. Dougla...
CCCG
2006
15 years 6 months ago
On Bipartite Matching under the RMS Distance
Given two sets A and B of n points each in R2 , we study the problem of computing a matching between A and B that minimizes the root mean square (rms) distance of matched pairs. W...
Jeff M. Phillips, Pankaj K. Agarwal
120
Voted
DSN
2005
IEEE
15 years 10 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...