Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...
— Considerable attention has been focused on the properties of graphs derived from Internet measurements. Router-level topologies collected via traceroute-like methods have led s...
Anukool Lakhina, John W. Byers, Mark Crovella, Pen...
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
This paper presents a new wavelet based retrieval approach based on Spherically Invariant Random Vector (SIRV) modeling of wavelet subbands. Under this multivariate model, wavelet...