Sciweavers

381 search results - page 16 / 77
» host 2008
Sort
View
CEC
2008
IEEE
15 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ELPUB
2008
ACM
14 years 11 months ago
The Role of Academic Libraries in Building Open Communities of Scholars
This paper describes three important pillars of publishing programs emerging at university libraries: providing a robust publishing platform, engaging the academic community in di...
Kevin Stranack, Gwen Bird, Rea Devakos
NDSS
2008
IEEE
15 years 3 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
GLOBECOM
2008
IEEE
15 years 3 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
NDSS
2008
IEEE
15 years 3 months ago
Measuring and Detecting Fast-Flux Service Networks
We present the first empirical study of fast-flux service networks (FFSNs), a newly emerging and still not widelyknown phenomenon in the Internet. FFSNs employ DNS to establish ...
Thorsten Holz, Christian Gorecki, Konrad Rieck, Fe...