4.7 Article

A Large Scale Characterization of Device Uptimes

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Editorial Material Computer Science, Hardware & Architecture

Aging, Fast and Slow

Michael Grottke et al.

Summary: Software can exhibit symptoms of two different types of aging, and sometimes it can be affected by both types simultaneously.

COMPUTER (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Landing Reinforcement Learning onto Smart Scanning of The Internet of Things

Jian Qu et al.

Summary: This paper investigates the problem of using reinforcement learning to schedule IoT device scans and reveals the effectiveness of different scanning strategies based on real-world data.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022) (2022)

Article Criminology & Penology

Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19

Steven Kemp et al.

Summary: The changes in routine activities during the COVID-19 pandemic led to a decrease in outdoor predatory crimes and an increase in cybercrime and fraud opportunities. Time-series analysis of historical data on cybercrime and fraud in the UK showed that both total cybercrime and fraud levels exceeded predicted levels, with variations in victimization across different fraud types and victims. The implications of these findings on policy, practice, and academic debates regarding cybercrime and fraud opportunities during COVID-19 were discussed.

JOURNAL OF CONTEMPORARY CRIMINAL JUSTICE (2021)

Editorial Material Computer Science, Hardware & Architecture

Tracking Pandemic-Driven Internet Traffic

Jennifer Rexford

COMMUNICATIONS OF THE ACM (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

Giovanni Barbieri et al.

Summary: Modern Industrial Control Systems enable remote communication through the Internet using industrial protocols, but security issues remain a concern. Research shows that tools like Shodan cannot accurately detect legitimate use of insecure industrial traffic, while traffic analysis at local Internet Exchange Points can provide a more accurate assessment of communication issues in Industrial Control Systems.

30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021) (2021)

Article Sociology

Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK

David Buil-Gil et al.

Summary: The COVID-19 outbreak and the lockdown measures have led to a significant increase in cyber-dependent crime and online fraud in the UK. In particular, cases related to online shopping, auctions, social media hacking, and email hacking have seen a notable rise during the months with strict lockdown policies. The increase in cyber-dependent crimes mainly affects individual victims rather than organizations.

EUROPEAN SOCIETIES (2021)

Article Computer Science, Hardware & Architecture

Meltdown: Reading Kernel Memory from User Space

Moritz Lipp et al.

COMMUNICATIONS OF THE ACM (2020)

Article Computer Science, Hardware & Architecture

Campus traffic and e-Learning during COVID-19 pandemic

Thomas Favale et al.

COMPUTER NETWORKS (2020)

Proceedings Paper Computer Science, Theory & Methods

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Article Computer Science, Theory & Methods

Automatic Software Repair: A Bibliography

Martin Monperrus

ACM COMPUTING SURVEYS (2018)

Article Computer Science, Hardware & Architecture

Characterizing and Modeling Patching Practices of Industrial Control Systems

Brandon Wang et al.

PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

Self-healing systems - survey and synthesis

Debanjan Ghosh et al.

DECISION SUPPORT SYSTEMS (2007)