Filters








64 Hits in 11.6 sec

Friends of an enemy

Baris Coskun, Sven Dietrich, Nasir Memon
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
We propose a simple method to identify potential members of an unstructured P2P botnet in a network starting from a known peer.  ...  This, along with the low probability of any other host communicating with this mutual peer, allows us to link local nodes within a P2P botnet together.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments and David Dittrich for his valuable contributions.  ... 
doi:10.1145/1920261.1920283 dblp:conf/acsac/CoskunDM10 fatcat:jbqi6ouyhfgkdpnzh6lyzttxs4

Experiments with P2P Botnet Detection

Lionel Rivière, Sven Dietrich
2012 it - Information Technology  
Contribution Initially, this scheme was built to identify potential members of an unstructured P2P botnet in a network starting from a known peer.  ...  As demonstrated in the Friends of An Enemy paper, in the case of P2P botnets with an unstructured topology, if bots randomly pick peers to communicate with, then there is a high probability that any given  ... 
doi:10.1524/itit.2012.0668 fatcat:wpq5qmc5lnddpphmdcvcxvqemm

Gangs of the internet: Towards automatic discovery of peer-to-peer communities

Liyun Li, Suhas Mathur, Baris Coskun
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
Not specific to P2P Botnet detection N/A N/A Enterprise Friends of an Enemy [12] P2P Botnet detection in an enterprise network by partitioning of a mutual-contacts graph N/A N/A Enterprise Statistical  ...  Internet Service Providers and network administrators currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their networks.  ...  port number is mostly used when the members of an inferred community communicate with each other.  ... 
doi:10.1109/cns.2013.6682693 dblp:conf/cns/LiMC13 fatcat:afazwk3mdffrxjh7jumtagbgnm

Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures

Chris W. Johnson
2013 Ergonomics  
The closing sections of the paper identify a roadmap for the defensive measures that might be used to minimise the future threats from the 'dark side' of social networking 1 .  ...  Malware is, typically, disguised in a document that was intercepted from a colleague or friend. The recipient is more likely to open an attachment or link if it has been sent from a trusted source.  ...  They identified the enormous benefits derived from Cloud computing, peer to peer techniques and from social networking.  ... 
doi:10.1080/00140139.2013.812749 pmid:23826703 fatcat:gqobtlj3y5hcxgtxni4q6z75f4

Decentralized Infrastructure for (Neuro)science [article]

Jonny L. Saunders
2022 arXiv   pre-print
Based on a system of peer-to-peer linked data, I sketch interoperable systems for shared data, tools, and knowledge that map onto three domains of platform capture: storage, computation and communication  ...  The challenge of infrastructure is not solely technical, but also social and cultural, and so I attempt to ground a practical development blueprint in an ethics for organizing and maintaining it.  ...  When peer A refers to peer B's namespace, then, it would be in reference to peer A's follow/friends list.  ... 
arXiv:2209.07493v1 fatcat:yazadgtvtvedtiqhfg3f32aqq4

Pragmatic deficits and social impairment in children with ADHD

Ekaterina Staikova, Hilary Gomes, Vivien Tartter, Allyssa McCabe, Jeffrey M. Halperin
2013 Journal of Child Psychology and Psychiatry and Allied Disciplines  
Five of these interviewees then participated as co-researchers in a Youth Design and Research Collective (YDRC) to analyze interview findings through the collaborative design of an open source social network  ...  The productive and entertaining promises of proprietary media have led to widespread adoption among youth whose daily activities now generate troves of data that are mined for governance and profit.  ...  and visualize how much of a "Match," "Friend," or "Enemy" two people are likely to be.  ... 
doi:10.1111/jcpp.12082 pmid:23682627 pmcid:PMC3648855 fatcat:bjynv4m5czbtfazskxgi5glwue

Global Capital Flows, Time-Varying Fundamentals and Transitional Exchange Rate Dynamics

Suleyman H. Kal
2011 Journal of Forecasting  
Five of these interviewees then participated as co-researchers in a Youth Design and Research Collective (YDRC) to analyze interview findings through the collaborative design of an open source social network  ...  The productive and entertaining promises of proprietary media have led to widespread adoption among youth whose daily activities now generate troves of data that are mined for governance and profit.  ...  and visualize how much of a "Match," "Friend," or "Enemy" two people are likely to be.  ... 
doi:10.1002/for.1267 fatcat:wlnf3hslevds3bo3jr62v4g57a

False memories for dissonance inducing events

Dario N. Rodriguez, Deryn Strange
2014 Memory  
Five of these interviewees then participated as co-researchers in a Youth Design and Research Collective (YDRC) to analyze interview findings through the collaborative design of an open source social network  ...  The productive and entertaining promises of proprietary media have led to widespread adoption among youth whose daily activities now generate troves of data that are mined for governance and profit.  ...  and visualize how much of a "Match," "Friend," or "Enemy" two people are likely to be.  ... 
doi:10.1080/09658211.2014.881501 pmid:25625288 fatcat:4vsg65cndzhsdlfdt7qbb7q2ti

Gangs in a Global Comparative Perspective [chapter]

Dennis Rodgers, Jennifer M. Hazen
2014 Global Gangs  
The authors rational response to their situation. But the first step to engaging with them coherently is to try to draw on as wide a variety of experiences as possible from across the globe.  ...  Introduced in 2009, Bitcoin's unit of currency is "an electronic coin as a chain of digital signatures." 2 A Peer-to-Peer (P2P) network verifies transmission from the sender to recipient, each of who can  ...  Today's zombies steal, pickpocket and snatch where they live, terrorizing neighbors, family members and friends.  ... 
doi:10.5749/minnesota/9780816691470.003.0001 fatcat:cby7mjoiqradni64s7eqhyxwqm

Gangs in a global comparative perspective

Dennis Rodgers, Jennifer M. Hazen
2016 Freedom from Fear  
The authors rational response to their situation. But the first step to engaging with them coherently is to try to draw on as wide a variety of experiences as possible from across the globe.  ...  Introduced in 2009, Bitcoin's unit of currency is "an electronic coin as a chain of digital signatures." 2 A Peer-to-Peer (P2P) network verifies transmission from the sender to recipient, each of who can  ...  Today's zombies steal, pickpocket and snatch where they live, terrorizing neighbors, family members and friends.  ... 
doi:10.18356/d065ce26-en fatcat:z6ifukivezb6xjwcneeyygtwhq

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
Federation members could also address the lack of a common repository for available services via peer-to-peer approaches using a distributed hash table overlay network for service discovery. 12 They  ...  He is the editor of the Dictionary of Algorithms and Data Structures (www.nist.gov/dads/), and is a member of ACM and a senior member of IEEE. Contact him at paul. black@nist.gov.  ...  The award, which consists of a certificate and a US$2,000 honorarium, is presented annually to an individual for "an outstanding contribution in the application of high performance computers using innovative  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

Adversarial Web Search

Carlos Castillo
2010 Foundations and Trends in Information Retrieval  
First, the semantics of trust propagation ("the friend of a friend is my friend") are clear and effective in practice, while the semantics of distrust propagation ("the enemy of my enemy is my friend")  ...  In both local and global trust scenarios, the computation can be either centralized or distributed among a number of peers.  ... 
doi:10.1561/1500000021 fatcat:toxnvajrmbdppf5hytdbnykuiq

Parameters Winter 2019 – 2020

USAWC Press
2019 Parameters  
The Common Experience First, it may be useful to describe and understand the war colleges as they are today.  ...  He previously served as dean of the NATO Defense College in Rome, a chair at the National War College, and an assistant professor at West Point.  ...  support of her great and powerful friend.  ... 
doi:10.55540/0031-1723.3113 fatcat:frpcjxwe2vepdaqkaqt3iwv6xa

Parameters – Full Issue – Winter 2019

USAWC Parameters
2019 Parameters  
The Common Experience First, it may be useful to describe and understand the war colleges as they are today.  ...  He previously served as dean of the NATO Defense College in Rome, a chair at the National War College, and an assistant professor at West Point.  ...  support of her great and powerful friend.  ... 
doi:10.55540/0031-1723.2666 fatcat:plflrunbdjd3fews2c4k7js3eq

The Future of Learning 2025: Developing a vision for change

Christine Redecker, Yves Punie
2013 Future Learning  
Special thanks must go to Richard Sandford for his leadership in theoretical and methodological issues and for his practical management at the heart of the project.  ...  Acknowledgements This report is the result of the work of a large number of individuals and institutions, in particular, the members of the Beyond Current Horizons team at DCSF and Futurelab:  ...  explicit rejection of the oppressor/enemy 36 .  ... 
doi:10.7564/13-fule12 fatcat:pmfgb63yyvbcrh4sdzz53svytm
« Previous Showing results 1 — 15 out of 64 results