Sciweavers

96 search results - page 8 / 20
» Worm Traffic Analysis and Characterization
Sort
View
USS
2008
15 years 2 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
IPPS
1998
IEEE
15 years 4 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
PEWASUN
2005
ACM
15 years 5 months ago
Characterizing and modeling user mobility in a cellular data network
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
Emir Halepovic, Carey L. Williamson
P2P
2010
IEEE
182views Communications» more  P2P 2010»
14 years 9 months ago
Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks
Abstract--As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empir...
Seungbae Kim, Xiaofei Wang, Hyunchul Kim, Taekyoun...
INFOCOM
1997
IEEE
15 years 4 months ago
Time Scale Analysis of an ATM Queueing System with Long-Range Dependent Traffic
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...
Gilberto Mayor, John A. Silvester