In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger...
Abstract— This work deals with the control and the observation of a remote system using Internet as a communication line. The process consists in a Slave part S, with poor comput...
Alexandre Seuret, M. Termens-Ballester, A. Toguyen...
The research community is working towards a new allencompassing vision of the Internet. This vision certainly includes powerful transport and switching technologies, wireless netw...
Nicola Blefari-Melazzi, Wolfgang Kellerer, Chie No...
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...