Sciweavers

61 search results - page 2 / 13
» Detecting sources of computer viruses in networks: theory an...
Sort
View
ANCS
2009
ACM
13 years 4 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...
ACL
2010
13 years 3 months ago
Detecting Experiences from Weblogs
Weblogs are a source of human activity knowledge comprising valuable information such as facts, opinions and personal experiences. In this paper, we propose a method for mining pe...
Keun-Chan Park, Yoonjae Jeong, Sung-Hyon Myaeng
RAID
2010
Springer
13 years 4 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
ACSW
2006
13 years 7 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
OSDI
2004
ACM
14 years 6 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...