Sciweavers

830 search results - page 124 / 166
» Pricing-Based Control of Large Networks
Sort
View
IEEESP
2011
14 years 1 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
ICIP
2008
IEEE
15 years 11 months ago
Peer-to-peer multicast live video streaming with interactive virtual pan/tilt/zoom functionality
Video streaming with virtual pan/tilt/zoom functionality allows the viewer to watch arbitrary regions of a high-spatial-resolution scene. In our proposed system, the user controls...
Aditya Mavlankar, Jeonghun Noh, Pierpaolo Bacciche...
57
Voted
CCS
2009
ACM
15 years 4 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
SIES
2007
IEEE
15 years 4 months ago
Refactoring an Automotive Embedded Software Stack using the Component-Based Paradigm
Abstract— The number of electronic systems in cars is continuously growing. Electronic systems, consisting of so-called electronic control units (ECUs) interconnected by a commun...
Thomas M. Galla, Dietmar Schreiner, Wolfgang Forst...
ACSAC
2005
IEEE
15 years 3 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan