Sciweavers

1447 search results - page 72 / 290
» Simulating Internet Worms
Sort
View
RAID
2004
Springer
15 years 5 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
DIMVA
2010
15 years 1 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
ARESEC
2011
119views more  ARESEC 2011»
13 years 12 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
PADS
2006
ACM
15 years 5 months ago
Modeling Autonomous-System Relationships
The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocol...
Xenofontas A. Dimitropoulos, George F. Riley
COMCOM
2002
80views more  COMCOM 2002»
14 years 11 months ago
An extension of the ns simulator for active network research
Active Networks (ANs) represent a new paradigm of computer network, which will enable new Internet applications and services and improve end-to-end performance of the existing one...
Guillermo Rodriguez, Pedro Merino, María-de...