Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Abstract—Energy efficiency is a central challenge in batteryoperated sensor networks. Current energy-efficient mechanisms employ either duty cycling, which reduces idle listeni...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...