Sciweavers

2912 search results - page 127 / 583
» Overlay Networks - Implementation by Specification
Sort
View
125
Voted
DIMVA
2010
15 years 4 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...
147
Voted
CCGRID
2006
IEEE
15 years 9 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
116
Voted
DAC
2001
ACM
16 years 4 months ago
Automatic Generation of Application-Specific Architectures for Heterogeneous Multiprocessor System-on-Chip
We present a design flow for the generation of application-specific multiprocessor architectures. In the flow, architectural parameters are first extracted from a high-level syste...
Damien Lyonnard, Sungjoo Yoo, Amer Baghdadi, Ahmed...
IFIP
2009
Springer
15 years 1 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
127
Voted
DILS
2004
Springer
15 years 8 months ago
Domain-Specific Concepts and Ontological Reduction within a Data Dictionary Framework
This paper describes a new method for the ontologically based standardization of concepts in the medical domain. As an application of this method we developed a data dictionary whi...
Barbara Heller, Heinrich Herre, Kristin Lippoldt