Sciweavers

718 search results - page 133 / 144
» Security protocols, properties, and their monitoring
Sort
View
114
Voted
DSN
2009
IEEE
15 years 8 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
131
Voted
IMC
2009
ACM
15 years 8 months ago
Understanding online social network usage from a network perspective
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users...
Fabian Schneider, Anja Feldmann, Balachander Krish...
NOMS
1998
IEEE
133views Communications» more  NOMS 1998»
15 years 6 months ago
ATM customer network management using WWW and CORBA technologies
In this paper, we present a framework for managing ATM customer networks using WWW and CORBA technologies. The WWW technology may provide network management operators with platfor...
Jong-Wook Baek, Tae-Joon Ha, Jong-Tae Park, James ...
139
Voted
RTAS
2008
IEEE
15 years 8 months ago
Distributed Resource Kernels: OS Support for End-To-End Resource Isolation
The notion of resource reservation for obtaining real-time scheduling guarantees and enforcement of resource usage has gained strong support in recent years. However, much work on...
Karthik Lakshmanan, Raj Rajkumar
111
Voted
CONEXT
2009
ACM
15 years 3 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...