Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocol...
Active Networks (ANs) represent a new paradigm of computer network, which will enable new Internet applications and services and improve end-to-end performance of the existing one...