Parasitic computing

Results: 7



#Item
1Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / Distributed computing / Cyberwarfare / Botnet / Command and control / Distributed hash table / Kad network

Tsunami: A parasitic, indestructible botnet on Kad Ghulam Memon, Jun Li & Reza Rejaie Peer-to-Peer Networking and

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2013-04-22 13:17:57
2Computing / Email / Information technology management / Anti-spam techniques / Email spam / Spam / DomainKeys Identified Mail / Sender Policy Framework / Bayesian poisoning / Spamming / Internet / Spam filtering

Breaking Anti-Spam Systems with Parasitic Spam Morton Swimmer B. Leiba and I. Whalley Nathaniel Borenstein

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:26
3Malware / Code Red / Computer virus / Morris worm / Blaster / Sasser / Warhol worm / Parasitic worm / Computing / Computer worms / Cyberwarfare / Computer security

Mobile Contagion: Simulation of Infection & Defense Everett Anderson Kevin Eustice Shane Markstrum Mark Hansen Peter Reiher Computer Science Computer Science Computer Science

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:08:19
4Threads / Parallel computing / Concurrency control / Fiber / Parasitism / Actor model / Non-blocking algorithm / Process / Central processing unit / Computing / Concurrent computing / Computer programming

Lightweight Asynchrony Using Parasitic Threads KC Sivaramakrishnan Lukasz Ziarek Raghavendra Prasad

Add to Reading List

Source URL: kcsrk.info

Language: English
5Computer worm / Computer security / Blaster / Honeyd / Parasitic worm / Computer virus / Computing / Computer network security / Cyberwarfare / Honeypot

Honeypots against Worms 101 Black Hat Asia 2003 oudot at rstack .org http://www. rstack.org/oudot team rstack.org

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
6Computer security / Distributed computing architecture / Parasitic computing / Transmission Control Protocol / Internet / Transport layer / Internet protocol suite / Denial-of-service attack / Computing / Network architecture / Internet protocols

letters to nature than any previously discussed DR mechanism. Our cross-sections are in fair agreement with the range of FALP measurements but even our upper-bound cross-section remains ten times smaller than the storage

Add to Reading List

Source URL: www.barabasilab.com

Language: English - Date: 2008-04-11 15:57:31
7Computer programming / Procedural programming languages / Mistletoe / Santalales / Arceuthobium / Keyword / ALGOL 68 / C / Software engineering / Parasitic plants / Computing

Dwarf Mistletoe Impact Model Keywords

Add to Reading List

Source URL: www.fs.fed.us

Language: English - Date: 2012-06-29 11:02:43
UPDATE