Sciweavers

1447 search results - page 33 / 290
» Simulating Internet Worms
Sort
View
ICRA
2005
IEEE
136views Robotics» more  ICRA 2005»
15 years 5 months ago
Polychaete-like Undulatory Robotic Locomotion
- Polychaete annelid worms provide a biological paradigm of versatile locomotion and effective motion control, adaptable to a large variety of unstructured environmental conditions...
Dimitris P. Tsakiris, Michael Sfakiotakis, Arianna...
CISIS
2007
IEEE
15 years 6 months ago
P Systems and Finite Automata
Abstract— In this paper, we integrate the traditional finitestate automata (words, or string based) into the membrane computing paradigm, as previous work prevalently concentrat...
Xian Xu
SIGCOMM
2010
ACM
15 years 33 min ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
NDSS
2006
IEEE
15 years 5 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
CCS
2005
ACM
15 years 5 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar