A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Online Accumulation: Reconstruction of Worm Propagation Path
[chapter]
2008
Lecture Notes in Computer Science
This paper introduces the Accumulation Algorithm which can efficiently tracing worm origin and the initial propagation paths, and presents an improved online Accumulation Algorithm using sliding detection ...
Results indicate that the online Accumulation Algorithm can accurately tracing worms and efficiently containing their propagation in an approximately real-time manner. ...
Conclusions Online tracing the evolution of a worm outbreak reconstructs not only patient zero (i.e., the initial victim), but also the infection node list in evolution process. ...
doi:10.1007/978-3-540-88140-7_15
fatcat:y3fzbt4hhzaobnyzvdrmt4dzm4
Reconstruction of Worm Propagation Path Using a Trace-back Approach
[article]
2021
arXiv
pre-print
The results show that our algorithm can reconstruct the propagation path of worms with high recall and precision, on average around 0.96. ...
Worm origin identification and propagation path reconstruction are essential problems in digital forensics. However, a small number of studies have specifically investigated these problems so far. ...
It reconstructed the propagation path of the worm by walking backward in time along paths of flows. ...
arXiv:2108.07432v1
fatcat:ywqfi3jjg5hj3bdpae7hja42fu
Online identification of hierarchical heavy hitters
2004
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04
In this paper, we focus on online identification of 1-dimensional and 2-dimensional hierarchical heavy hitters (HHHs), arguably the two most important scenarios in traffic analysis. ...
We show that the problem of HHH detection can be transformed to one of dynamic packet classification by taking a top-down approach and adaptively creating new rules to match HHHs. ...
, malicious activities such as denial of service attacks (DoS) [23] , and worm propagation [28] . ...
doi:10.1145/1028788.1028802
dblp:conf/imc/ZhangSSDL04
fatcat:faww7qvzefbhnmngpoe62m3twq
Treatise Online, no. 8, Part E, Revised, Volume 4, Chapter 9F: Functional morphology of the Paleozoic stromatoporoid skeleton
2011
Treatise Online
The formation of some growth modules that project into the surrounding sediment in some laminate stromatoporoids may be difficult to reconstruct (Fig. 5,2, Fig. 6 ,2), but sediment must have accumulated ...
SKELETAL FRAGMENTS AND PROPAGATION The highly branched forms and rapid growth rates of many modern scleractinians allow them to overgrow and shade their competitors and to propagate new colonies by fragmentation ...
doi:10.17161/to.v0i0.4077
fatcat:uj57wj3yjzchzjoy3pqnjh5kem
Privacy and security in online social networks: A survey
2017
Online Social Networks and Media
Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities. ...
Built on a foundation of trust-users connect to other users with common interests or overlapping personal trajectories-online social networks and the associated applications extract an unprecedented volume ...
Thus, a fresh start to reconstruct the collection should be started from the beginning. ...
doi:10.1016/j.osnem.2017.09.001
fatcat:xme5wwkyfbhnpgoiwgadknageq
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. ...
To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs. ...
Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof. ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
Environmental Aspects of Zoonotic Diseases
2012
Water Intelligence Online
This is an Open Access book distributed under the terms of the Creative Commons Attribution Licence (CC BY-NC-ND 4.0), which permits copying and redistribution for non-commercial purposes, provided the ...
In humans, ingested eggs will develop into mature larvae but not into mature worms (see below life cycle). ...
The soil in the anthrax-affected region had been disturbed recently due to improvements in the irrigation system and reconstruction of channels and drainage systems. ...
doi:10.2166/9781780400761
fatcat:bydnntwffrhixnioaryjvwoexi
Opposing Bonsais
2021
Kritike: An Online Journal of Philosophy
KRITIKE and the Department of Philosophy of the University of Santo Tomas do not necessarily endorse the views expressed in the articles published. ...
The copyright of an article published by the journal remains with its author; users are required to acknowledge the original authorship. ...
The privileging of contemplative life dates back to ancient Greece, specifically to the tradition propagated by Plato and Aristotle. ...
doi:10.25138/15.3.cp
fatcat:hkgixnp5iragve6twqjs7i25gm
A survey on data analysis on large-Scale wireless networks: online stream processing, trends, and challenges
2020
Journal of Internet Services and Applications
Additionally, we explore the data preprocessing, feature engineering, and the machine learning algorithms applied to the scenario of wireless network analytics. ...
We present the primary methods for sampling, data collection, and monitoring of wireless networks and we characterize knowledge extraction as a machine learning problem on big data stream processing. ...
Acknowledgements We acknowledge colleagues of the Universidade Federal Fluminense (UFF), Samsung R&D Institute, and Universidade Federal de Juíz de Fora (UFJF) for their incentives and suggestions. ...
doi:10.1186/s13174-020-00127-2
fatcat:kpx2fyxxkreevga6r22nqdj6rq
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System
2009
2009 Annual Computer Security Applications Conference
Current intrusion recovery techniques often do not preserve the accumulated useful state of running applications and have very limited system availability when performing recovery routines. ...
SHELF uses quarantine methods to prevent infection propagation so that uninfected and recovered objects can provide availability during the recovery phase. ...
In some business services like online banking and MMO game hosting, a small amount of loss of business continuity and availability may cause great loss of money. ...
doi:10.1109/acsac.2009.52
dblp:conf/acsac/XiongJL09
fatcat:sms5irelbvgqpfehtar4bah5vq
Intrinsically aggregation-prone proteins form amyloid-like aggregates and contribute to tissue aging in C. elegans
[article]
2018
bioRxiv
pre-print
In neurodegenerative diseases and amyloidoses, specific proteins self-assemble into amyloid fibrils and accumulate as pathological solid aggregates in a variety of tissues. ...
later stages of life. ...
The amyloid fibrils accumulate as pathological deposits in a variety of different tissues. ...
doi:10.1101/417873
fatcat:wiopa7phtzctziiwabgrzqk42u
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency
2010
Computer Networks
To the best of our knowledge, HiFIND is the first online DoS resilient flow-level intrusion detection system for high-speed networks (e.g. ...
Global-scale attacks like worms and botnets are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hosts. ...
Scans are probably the most common type of intrusion. Most of them are caused by either worm propagation or botnet sweeps. ...
doi:10.1016/j.comnet.2009.10.016
fatcat:ea7kqydptjd5xkxeqdr5itaysq
Dimensionality and Dynamics in the Behavior of C. elegans
2008
PLoS Computational Biology
Here we show that the space of shapes adopted by the nematode C. elegans is surprisingly low dimensional, with just four dimensions accounting for 95% of the shape variance, and we partially reconstruct ...
Stimulus-dependent correlations among the different modes suggest that one can generate more reliable behaviors by synchronizing stimuli to the state of the worm in shape space. ...
Chapman for help in the initial building of the worm tracker and for programming the thinning algorithm used for real-time processing. ...
doi:10.1371/journal.pcbi.1000028
pmid:18389066
pmcid:PMC2276863
fatcat:erbdwjlmzrctjhyjqapxmmh7hy
Integrative approaches for finding modular structure in biological networks
2013
Nature reviews genetics
Abstract | A central goal of systems biology is to elucidate the structural and functional architecture of the cell. ...
An extreme case of negative genetic epistasis in which the mutation of two genes in combination, but not individually, causes a lethal phenotype. ...
Acknowledgements We gratefully acknowledge US National Institutes of Health (NIH) grants P41 GM103504 and P50 GM085764 in support of this work. ...
doi:10.1038/nrg3552
pmid:24045689
pmcid:PMC3940161
fatcat:4b5rihmvyzefrm3om7vzanvqc4
Using malware for software-defined networking–based smart home security management through a taint checking approach
2016
International Journal of Distributed Sensor Networks
of Science and Technology of Taiwan under grant nos MOST 104-2632-E-168-001, MOST 104-2218-E-001-002 and MOST 105-2410-H-168-002. ...
Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported jointly by TWISC@NCKU and the Ministry ...
and mitigation, 16, 17 worm propagation 18 and botnet protection, 19 have been suggested by several researchers. ...
doi:10.1177/1550147716662947
fatcat:d63ugyia3ve3hd65oe3osqzuqi
« Previous
Showing results 1 — 15 out of 953 results