Sciweavers

438 search results - page 27 / 88
» Defending Critical Infrastructure
Sort
View
91
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
88
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Always up-to-date: scalable offline patching of VM images in a compute cloud
Patching is a critical security service that keeps computer systems up to date and defends against security threats. Existing patching systems all require running systems. With th...
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, R...
117
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
Stochastic Fluid Theory for P2P Streaming Systems
—We develop a simple stochastic fluid model that seeks to expose the fundamental characteristics and limitations of P2P streaming systems. This model accounts for many of the es...
Rakesh Kumar, Yong Liu, Keith W. Ross
108
Voted
EUC
2005
Springer
15 years 6 months ago
Ubiquitous Content Formulations for Real-Time Information Communications
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Ka Lun Eddie Law, Sunny So
ACMDIS
1995
ACM
15 years 4 months ago
Facilitating Communication in Software Development
Effective communication is critical to the success of a software development project. It factors into the productivity of individuals and organizations, and has particular impact ...
Michael E. Atwood, Bart Burns, Dieter Gairing, And...