GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Elsevier BV ; 2014
    In:  Future Generation Computer Systems Vol. 38 ( 2014-09), p. 36-46
    In: Future Generation Computer Systems, Elsevier BV, Vol. 38 ( 2014-09), p. 36-46
    Type of Medium: Online Resource
    ISSN: 0167-739X
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2014
    detail.hit.zdb_id: 48781-8
    detail.hit.zdb_id: 2020551-X
    detail.hit.zdb_id: 1100390-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Elsevier BV ; 2017
    In:  Future Generation Computer Systems Vol. 72 ( 2017-07), p. 319-326
    In: Future Generation Computer Systems, Elsevier BV, Vol. 72 ( 2017-07), p. 319-326
    Type of Medium: Online Resource
    ISSN: 0167-739X
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2017
    detail.hit.zdb_id: 48781-8
    detail.hit.zdb_id: 2020551-X
    detail.hit.zdb_id: 1100390-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2015
    In:  IEEE Transactions on Computers Vol. 64, No. 3 ( 2015-3), p. 640-653
    In: IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers (IEEE), Vol. 64, No. 3 ( 2015-3), p. 640-653
    Type of Medium: Online Resource
    ISSN: 0018-9340 , 1557-9956 , 2326-3814
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015
    detail.hit.zdb_id: 1473005-4
    detail.hit.zdb_id: 218504-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2018
    In:  IEEE Transactions on Communications Vol. 66, No. 9 ( 2018-9), p. 4059-4073
    In: IEEE Transactions on Communications, Institute of Electrical and Electronics Engineers (IEEE), Vol. 66, No. 9 ( 2018-9), p. 4059-4073
    Type of Medium: Online Resource
    ISSN: 0090-6778 , 1558-0857
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2018
    detail.hit.zdb_id: 2028235-7
    detail.hit.zdb_id: 121987-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2017
    In:  Concurrency and Computation: Practice and Experience Vol. 29, No. 14 ( 2017-07-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 29, No. 14 ( 2017-07-25)
    Abstract: Scale‐free networks are often used to model a wide range of real‐world networks, such as social, technological, and biological networks. Understanding the structure of scale‐free networks evolves into a big data problem for business, management, and protein function prediction. In the past decade, there has been a surge of interest in exploring the properties of scale‐free networks. Two interesting properties have attracted much attention: the assortative mixing and community structure. However, these two properties have been studied separately in either theoretical models or real‐world networks. In this paper, we show that the structural features of communities are highly related with the assortative mixing in scale‐free networks. According to the value of assortativity coefficient, scale‐free networks can be categorized into assortative, disassortative, and neutral networks, respectively. We systematically analyze the community structure in these three types of scale‐free networks through six metrics: node embeddedness, link density, hub dominance, community compactness, the distribution of community sizes, and the presence of hierarchical communities. We find that the three types of scale‐free networks exhibit significant differences in these six metrics of community structures. First, assortative networks present high embeddedness, meaning that many links lying within communities but few links lying between communities. This leads to the high link density of communities. Second, disassortative networks exhibit great hubs in communities, which results in the high compactness of communities that nodes can reach each other via short paths. Third, in neutral networks, a big portion of links act as community bridges, so they display sparse and less compact communities. In addition, we find that (dis)assortative networks show hierarchical community structure with power‐law‐distributed community sizes, while neutral networks present no hierarchy. Understanding the structure of communities from the angle of assortative mixing patterns of nodes can provide insights into the network structure and guide us in modeling information propagation in different categories of scale‐free networks. Copyright © 2016 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2017
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2014
    In:  IEEE Transactions on Parallel and Distributed Systems Vol. 25, No. 12 ( 2014-12), p. 3306-3316
    In: IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers (IEEE), Vol. 25, No. 12 ( 2014-12), p. 3306-3316
    Type of Medium: Online Resource
    ISSN: 1045-9219
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2014
    detail.hit.zdb_id: 2027774-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Concurrency and Computation: Practice and Experience Vol. 24, No. 10 ( 2012-07), p. 1137-1153
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 24, No. 10 ( 2012-07), p. 1137-1153
    Abstract: In this paper, we present some practical experiences on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well‐known datasets as well as realistic alerts from the Australian Honey‐Pot. One important finding is that one alert has more than an 85% chance of being fused in the following five alerts. Of particular importance is our design of a novel lightweight Cache‐based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by intrusion detection system, but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target‐oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experiments compared CAFS with traditional centralized fusion. The results showed that the CAFS easily attained the desired level of simple, counter‐escapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a practical exploration in addressing problems from the academic point of view. Copyright © 2011 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2013
    In:  IEEE Transactions on Parallel and Distributed Systems Vol. 24, No. 8 ( 2013-08), p. 1633-1643
    In: IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers (IEEE), Vol. 24, No. 8 ( 2013-08), p. 1633-1643
    Type of Medium: Online Resource
    ISSN: 1045-9219
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013
    detail.hit.zdb_id: 2027774-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2023
    In:  ACM Computing Surveys Vol. 55, No. 1 ( 2023-01-31), p. 1-51
    In: ACM Computing Surveys, Association for Computing Machinery (ACM), Vol. 55, No. 1 ( 2023-01-31), p. 1-51
    Abstract: Studying information diffusion in SNS (Social Networks Service) has remarkable significance in both academia and industry. Theoretically, it boosts the development of other subjects such as statistics, sociology, and data mining. Practically, diffusion modeling provides fundamental support for many downstream applications (e.g., public opinion monitoring, rumor source identification, and viral marketing). Tremendous efforts have been devoted to this area to understand and quantify information diffusion dynamics. This survey investigates and summarizes the emerging distinguished works in diffusion modeling. We first put forward a unified information diffusion concept in terms of three components: information, user decision, and social vectors, followed by a detailed introduction of the methodologies for diffusion modeling. And then, a new taxonomy adopting hybrid philosophy (i.e., granularity and techniques) is proposed, and we made a series of comparative studies on elementary diffusion models under our taxonomy from the aspects of assumptions, methods, and pros and cons. We further summarized representative diffusion modeling in special scenarios and significant downstream tasks based on these elementary models. Finally, open issues in this field following the methodology of diffusion modeling are discussed.
    Type of Medium: Online Resource
    ISSN: 0360-0300 , 1557-7341
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2023
    detail.hit.zdb_id: 215909-0
    detail.hit.zdb_id: 1495309-2
    detail.hit.zdb_id: 626472-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2022
    In:  ACM Computing Surveys Vol. 54, No. 11s ( 2022-01-31), p. 1-36
    In: ACM Computing Surveys, Association for Computing Machinery (ACM), Vol. 54, No. 11s ( 2022-01-31), p. 1-36
    Abstract: Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It generates a large number of test cases and monitors the executions for defects. Fuzzing has detected thousands of bugs and vulnerabilities in various applications. Although effective, there lacks systematic analysis of gaps faced by fuzzing. As a technique of defect detection, fuzzing is required to narrow down the gaps between the entire input space and the defect space. Without limitation on the generated inputs, the input space is infinite. However, defects are sparse in an application, which indicates that the defect space is much smaller than the entire input space. Besides, because fuzzing generates numerous test cases to repeatedly examine targets, it requires fuzzing to perform in an automatic manner. Due to the complexity of applications and defects, it is challenging to automatize the execution of diverse applications. In this article, we systematically review and analyze the gaps as well as their solutions, considering both breadth and depth. This survey can be a roadmap for both beginners and advanced developers to better understand fuzzing.
    Type of Medium: Online Resource
    ISSN: 0360-0300 , 1557-7341
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2022
    detail.hit.zdb_id: 215909-0
    detail.hit.zdb_id: 1495309-2
    detail.hit.zdb_id: 626472-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...