Skip to main content

Showing 1–2 of 2 results for author: Karatza, H D

Searching in archive cs. Search in all archives.
.
  1. Honeypot-powered Malware Reverse Engineering

    Authors: Michele Bombardieri, Salvatore CastanĂ², Fabrizio Curcio, Angelo Furfaro, Helen D. Karatza

    Abstract: Honeypots, i.e. networked computer systems specially designed and crafted to mimic the normal operations of other systems while capturing and storing information about the interactions with the world outside, are a crucial technology into the study of cyber threats and attacks that propagate and occur through networks. Among them, high interaction honeypots are considered the most efficient becaus… ▽ More

    Submitted 13 January, 2016; v1 submitted 13 October, 2015; originally announced October 2015.

  2. A Gossip-based optimistic replication for efficient delay-sensitive streaming using an interactive middleware support system

    Authors: Constandinos X. Mavromoustakis, Helen D. Karatza

    Abstract: While sharing resources the efficiency is substantially degraded as a result of the scarceness of availability of the requested resources in a multiclient support manner. These resources are often aggravated by many factors like the temporal constraints for availability or node flooding by the requested replicated file chunks. Thus replicated file chunks should be efficiently disseminated in order… ▽ More

    Submitted 9 September, 2010; originally announced September 2010.

    Comments: IEEE Systems Journal 2010