Sciweavers

34 search results - page 5 / 7
» Poisoning the Kad Network
Sort
View
NSDI
2008
15 years 2 months ago
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
In this paper we highlight a number of challenges that arise in using crawling to measure the size, topology, and dynamism of distributed botnets. These challenges include traffic...
Chris Kanich, Kirill Levchenko, Brandon Enright, G...
WOTUG
2007
15 years 26 days ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the â...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
IMC
2006
ACM
15 years 5 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
CONNECTION
1998
66views more  CONNECTION 1998»
14 years 11 months ago
The Emergence of a 'Language' in an Evolving Population of Neural Networks
The evolution of language implies the parallel evolution of an ability to respond appropriately to signals (language understanding) and an ability to produce the appropriate signa...
Angelo Cangelosi, Domenico Parisi
CNSM
2010
14 years 9 months ago
A performance view on DNSSEC migration
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...
Daniel Migault, Cedric Girard, Maryline Laurent