Sciweavers

1698 search results - page 298 / 340
» Growing Complex Games
Sort
View
71
Voted
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
CSFW
2009
IEEE
15 years 4 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
GLOBECOM
2009
IEEE
15 years 4 months ago
Adaptive Dynamic Routing Supporting Service Management for Future Internet
— There is currently much debate in defining what form the Future Internet will take [22, 23, 24]. The current Internet is struggling to meet the needs of an ever-evolving societ...
Sasitharan Balasubramaniam, Dmitri Botvich, Ray Ca...
INFOCOM
2009
IEEE
15 years 4 months ago
Multi-VPN Optimization for Scalable Routing via Relaying
—Enterprise networks are increasingly adopting Layer 3 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) technology to connect geographically disparate locations...
MohammadHossein Bateni, Alexandre Gerber, Mohammad...
IPPS
2009
IEEE
15 years 4 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...