Sciweavers

2951 search results - page 520 / 591
» Secure Distributed DNS
Sort
View
96
Voted
ICIW
2009
IEEE
15 years 10 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
136
Voted
IMC
2009
ACM
15 years 9 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
SIGCOMM
2009
ACM
15 years 9 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
CCGRID
2008
IEEE
15 years 9 months ago
Peer-to-Peer Desktop Grids in the Real World: The ShareGrid Project
ShareGrid is a peer-to-peer desktop grid aimed at satisfying the computing needs of the small research laboratories located in the Piedmont area in Northern Italy. ShareGrid adopt...
Cosimo Anglano, Massimo Canonico, Marco Guazzone, ...
CEC
2008
IEEE
15 years 9 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith