You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 13th International Conference on Passive and Active Measurement, PAM 2012, held in Vienna, Austria, in March 2012. The 25 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers were arranged into eight sessions traffic evolution and analysis, large scale monitoring, evaluation methodology, malicious behavior, new measurement initiatives, reassessing tools and methods, perspectives on internet structure and services, and application protocols.
Although it is fashionable among modernists to claim that globalism emerged only since ca. 1800, the opposite can well be documented through careful comparative and transdisciplinary studies, as this volume demonstrates, offering a wide range of innovative perspectives on often neglected literary, philosophical, historical, or medical documents. Texts, images, ideas, knowledge, and objects migrated throughout the world already in the pre-modern world, even if the quantitative level compared to the modern world might have been different. In fact, by means of translations and trade, for instance, global connections were established and maintained over the centuries. Archetypal motifs developed...
The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurements. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year’s c- ference was held at ETH Zurich, Switzerland. PAM 2010 attracted 79 submissions. Each paper was carefully reviewed by at leastthreemembersoftheTechnicalProgramCom...
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011. The 24 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers were arranged into seven sessions covering passive measurement, wireless models, bandwidth, automated bots, route avoidance, interdomain protocols, timing, and diagnosis.
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks". The 10 revised full papers and 6 poster papers presented together with 4 short papers were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on traffic analysis, applications and privacy, traffic classification, and a poster session.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
An investigation into why the creation of nation-states coincided with bouts of civil war in the nineteenth-century Western world.
In the digital era, the Internet has evolved into a ubiquitous aspect of modern society. With the prominence of the Dark Web, understanding the components of the Internet and its available content has become increasingly imperative. The Dark Web: Breakthroughs in Research and Practice is an innovative reference source for the latest scholarly material on the capabilities, trends, and developments surrounding the secrecy of the Dark Web. Highlighting a broad range of perspectives on topics such as cyber crime, online behavior, and hacking, this book is an ideal resource for researchers, academics, graduate students, and professionals interested in the Dark Web.
The relevance of the Internet has dramatically grown in the past decades. However, the enormous financial impact attracts many types of criminals. Setting up proper security mechanisms (e.g., Intrusion Detection Systems (IDS)) has therefore never been more important than today. To further compete with today's data transfer rates (10 to 100 Gbit/s), dedicated hardware accelerators have been proposed to offload compute intensive tasks from general purpose processors. As one key technology, reconfigurable hardware architectures, e.g., the Field Programmable Gate Array (FPGA), are of particular interest to this end. This work addresses the use of such FPGAs in the context of interactive communic...