Sciweavers

3584 search results - page 610 / 717
» Design considerations for a network of information
Sort
View
RAID
2010
Springer
14 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SENSYS
2010
ACM
14 years 7 months ago
Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment
This paper considers the problem of estimating the power breakdowns for the main appliances inside a building using a small number of power meters and the knowledge of the ON/OFF ...
Deokwoo Jung, Andreas Savvides
TRIDENTCOM
2010
IEEE
14 years 7 months ago
TopHat: Supporting Experiments through Measurement Infrastructure Federation
Researchers use the PlanetLab testbed for its ability to host experimental applications in realistic conditions over the public besteffort internet. Such applications form overlays...
Thomas Bourgeau, Jordan Augé, Timur Friedma...
AISS
2010
119views more  AISS 2010»
14 years 7 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
CCR
2011
14 years 5 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...