Sciweavers

1639 search results - page 285 / 328
» internet 2006
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
AINA
2006
IEEE
15 years 3 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
APNOMS
2006
Springer
15 years 3 months ago
Network Support for TCP Version Migration
Recently, new versions of the TCP protocols such as HSTCP (High Speed TCP) has proposed to adopt the rapid growth of the Internet. However, it is important to consider a deployment...
Shingo Ata, Koichi Nagai, Ikuo Oka
APNOMS
2006
Springer
15 years 3 months ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi
BPM
2006
Springer
93views Business» more  BPM 2006»
15 years 3 months ago
Building Business Process Driven Web Applications
The Internet has turned to be one the most common platform for the development of applications. In addition, sometimes the specification of these applications is given to web devel...
Victoria Torres, Vicente Pelechano