Sciweavers

89 search results - page 10 / 18
» Multiple Coordinated Views for Network Attack Graphs
Sort
View
CCS
2009
ACM
16 years 8 days ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
92
Voted
CEC
2009
IEEE
15 years 6 months ago
Crosstalk and the cooperation of collectively autocatalytic reaction networks
— We examine a potential role of signalling crosstalk in Artificial Cell Signalling Networks (ACSNs). In this research, we regard these ACSNs or Artificial Biochemical Networks...
James Decraene, George G. Mitchell, Barry McMullin
101
Voted
ICCV
2003
IEEE
16 years 1 months ago
Calibration of a Hybrid Camera Network
Visual surveillance using a camera network has imposed new challenges to camera calibration. An essential problem is that a large number of cameras may not have a common field of ...
Xilin Chen, Jie Yang, Alex Waibel
SIGCOMM
2010
ACM
14 years 12 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
COMPGEOM
2004
ACM
15 years 5 months ago
Low-dimensional embedding with extra information
A frequently arising problem in computational geometry is when a physical structure, such as an ad-hoc wireless sensor network or a protein backbone, can measure local information...
Mihai Badoiu, Erik D. Demaine, Mohammad Taghi Haji...