Sciweavers

1447 search results - page 89 / 290
» Simulating Internet Worms
Sort
View
116
Voted
ISW
2007
Springer
15 years 7 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
CCS
2004
ACM
15 years 7 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
MASCOTS
2003
15 years 3 months ago
Creating Realistic BGP Models
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lea...
Xenofontas A. Dimitropoulos, George F. Riley
CEAS
2008
Springer
15 years 3 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
123
Voted
ICPP
2005
IEEE
15 years 7 months ago
Two-Tier Resource Allocation for Slowdown Differentiation on Server Clusters
Slowdown, defined as the ratio of a request’s queueing delay to its service time, is accepted as an important quality of service metric of Internet servers. In this paper, we i...
Xiaobo Zhou, Yu Cai, C. Edward Chow, Marijke F. Au...