-
1
-
-
11244321948
-
Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning
-
Technical Report, Version 1
-
Awerbuch B, Holmer D, Rubens H. Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning. Technical Report, In JHU Tech Report Version 1; 2003.
-
(2003)
JHU Tech Report
-
-
Awerbuch, B.1
Holmer, D.2
Rubens, H.3
-
2
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabási A-L, Albert R. Emergence of scaling in random networks. Science 1999;286 (5439):509-12.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
4
-
-
78549259165
-
On the analysis of the Zeus botnet crimeware toolkit
-
IEEE
-
Binsalleeh H, Ormerod T, Boukhtouta A, Sinha P, Youssef A, Debbabi M, Wang L. On the analysis of the Zeus botnet crimeware toolkit. In: 8th annual international conference on privacy security and trust (PST). IEEE; 2010. p. 31-8.
-
(2010)
8th Annual International Conference on Privacy Security and Trust (PST)
, pp. 31-38
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
7
-
-
70350755355
-
Do you trust your phone?
-
Di Noia T, Buccafurri F, editors. E-commerce and web technologies. Berlin/Heidelberg: Springer
-
Castiglione A, De Prisco R, De Santis A. Do you trust your phone? In: Di Noia T, Buccafurri F, editors. E-commerce and web technologies. Lecture notes in computer science, vol. 5692. Berlin/Heidelberg: Springer; 2009. p. 50-61, http://dx.doi.org/10.1007/978-3-642-03964-5-6.
-
(2009)
Lecture Notes in Computer Science
, vol.5692
, pp. 50-61
-
-
Castiglione, A.1
De Prisco, R.2
De Santis, A.3
-
8
-
-
79952091348
-
An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats
-
Castiglione A, De Santis A, Fiore U, Palmieri F. An enhanced firewall scheme for dynamic and adaptive containment of emerging security threats. In: 2010 international conference on broadband, wireless computing, communication and applications (BWCCA); 2010. p. 475-81. http://dx.doi.org/10.1109/BWCCA.2010. 117.
-
2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA); 2010
, pp. 475-481
-
-
Castiglione, A.1
De Santis, A.2
Fiore, U.3
Palmieri, F.4
-
10
-
-
84860417497
-
An asynchronous covert channel using spam
-
Castiglione A, De Santis A, Fiore U, Palmieri F. An asynchronous covert channel using spam. Computers and Mathematics with Applications 2012;63 (2):437-47, http://dx.doi.org/10.1016/j.camwa.2011.07.068.
-
(2012)
Computers and Mathematics with Applications
, vol.63
, Issue.2
, pp. 437-447
-
-
Castiglione, A.1
De Santis, A.2
Fiore, U.3
Palmieri, F.4
-
13
-
-
84901418243
-
Ant colony optimization: A new meta-heuristic
-
Dorigo, M. and Di Caro, G., Ant colony optimization: a new meta-heuristic, Evolutionary Computation, 1999. CEC 99. Proceedings of the 1999 Congress on, 1999;2(2):p. -1477, http://dx.doi.org/10.1109/CEC.1999.782657.
-
(1999)
Evolutionary Computation, 1999. CEC 99. Proceedings of the 1999 Congress on
, vol.2
, Issue.2
, pp. 1477
-
-
Dorigo, M.1
Di Caro, G.2
-
17
-
-
84866867710
-
-
Editors = Modelski, G. and Devezas, T. and Thompson, W.R., Publisher = Taylor \& Francis, isbn =9780203937297
-
Heylighen, Francis, Accelerating Socio-Technological Evolution: from ephemeralization and stigmergy to the global brain, Editors = Modelski, G. and Devezas, T. and Thompson, W.R., Publisher = Taylor \& Francis, isbn =9780203937297, 284-309, 2007.
-
(2007)
Accelerating Socio-Technological Evolution: From Ephemeralization and Stigmergy to the Global Brain
, pp. 284-309
-
-
Heylighen, F.1
-
18
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Berkeley, CA, USA: USENIX Association
-
Holz T, Steiner M, Dahl F, Biersack E, Freiling F. Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: Proceedings of the 1st Usenix workshop on large-scale exploits and emergent threats (LEET'08). Berkeley, CA, USA: USENIX Association; 2008. p. 9:1-9.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET'08)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
21
-
-
0002282741
-
Food neophobia in wild and laboratory mice (mus musculus domesticus)
-
Kronenberger J, Medioni J. Food neophobia in wild and laboratory mice (mus musculus domesticus). Behavioural Processes 1985;11(1):53-9.
-
(1985)
Behavioural Processes
, vol.11
, Issue.1
, pp. 53-59
-
-
Kronenberger, J.1
Medioni, J.2
-
22
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner R. Stuxnet: dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011;9(3):49-51.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
25
-
-
67649678799
-
Providing true end-to-end security in converged voice over IP infrastructures
-
Palmieri F, Fiore U. Providing true end-to-end security in converged voice over IP infrastructures. Computers and Security 2009;28(6):433-49, http://dx.doi.org/10.1016/j.cose.2009.01.004.
-
(2009)
Computers and Security
, vol.28
, Issue.6
, pp. 433-449
-
-
Palmieri, F.1
Fiore, U.2
-
27
-
-
77954740531
-
Botzilla: Detecting the "phoning home" of malicious software
-
Sierre, Switzerland: ACM; 22-26 March
-
Rieck K, Schwenk G, Limmer T, Holz T, Laskov P. Botzilla: detecting the "phoning home" of malicious software. In: Proceedings of the 2010 ACM symposium on applied computing (SAC). Sierre, Switzerland: ACM; 22-26 March 2010. p. 1978-84.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC)
, pp. 1978-1984
-
-
Rieck, K.1
Schwenk, G.2
Limmer, T.3
Holz, T.4
Laskov, P.5
-
31
-
-
59349084692
-
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks
-
Zhang Z, Ho P-H. Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. Journal of Network and Computer Applications 2009;32(3):710-20, http://dx.doi.org/10.1016/j.jnca.2008.07.011.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.3
, pp. 710-720
-
-
Zhang, Z.1
Ho, P.-H.2
|