Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Pedro Las-Casas"'
Autor:
Ketan Kulkarni, Thita Chiasakul, Nicoletta Riva, Renée Eslick, Caterina Casari, Ingrid Pabinger, Marc Blondon, Yacine Boulaftali, Robert Campbell, Pedro Las Casas, Mandy Lauw, Joshua Muia, Leslie Skeith
Publikováno v:
Journal of thrombosis and haemostasis : JTH. 18(10)
Publikováno v:
SoCC
Distributed tracing is a core component of cloud and datacenter systems, and provides visibility into their end-to-end runtime behavior. To reduce computational and storage overheads, most tracing frameworks do not keep all traces, but sample them un
Autor:
Marcelo H. P. C. Chaves, Elverton Fazzion, Klaus Steding-Jessen, Dorgival Guedes, Cristine Hoepers, Pedro Las-Casas, Italo Cunha, Osvaldo Fonseca, Wagner Meira
Publikováno v:
IEEE Internet Computing. 20:16-24
Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators, but it's difficult to measure the costs associated with spam traffic and determine who actu
Publikováno v:
SoCC
End-to-end tracing has emerged recently as a valuable tool to improve the dependability of distributed systems, by performing dynamic verification and diagnosing correctness and performance problems. Contrary to logging, end-to-end traces enable cohe
Autor:
Jussara M. Almeida, Humberto Torres Marques-Neto, Artur Ziviani, Dorgival Guedes, Pedro Las-Casas
Publikováno v:
Computer Networks. 57:526-539
Despite the large variety and wide adoption of different techniques to detect and filter unsolicited messages (spams), the total amount of such messages over the Internet remains very large. Some reports point out that around 80% of all emails are sp
Publikováno v:
BigDataSecurity/HPSC/IDS
As the Internet grows, cybersecurity problems also arise. Different types of malicious activities have been explored by attackers. However, the existent defense mechanisms are not able to completely end the malicious threats, perpetuating this contin
Autor:
Wagner Meira, Pedro Las-Casas, Osvaldo Fonseca, Marcelo H. P. C. Chaves, Elverton Fazzion, Klaus Steding-Jessen, Dorgival Guedes, Cristine Hoepers
Publikováno v:
Journal of Internet Services and Applications. 6
Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic analysis is an important tool in this context, allowing network administrators to understand th
Autor:
Pedro Las-Casas, Marcelo H. P. C. Chaves, Elverton Fazzion, Dorgival Guedes, Cristine Hoepers, Italo Cunha, Klaus Steding-Jessen, Wagner Meira, Osvaldo Fonseca
Publikováno v:
SBRC
Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing, and to network administrators, e.g., who provision and pay for the traffic. Recent proposa
Autor:
Wagner Meira, Pedro Las-Casas, Dorgival Guedes, Vinícius Vitor dos Santos Dias, Renato Ferreira
Publikováno v:
SBAC-PAD Workshops
Even as the web 2.0 grows, e-mail continues to be one of the most used forms of communication in the Internet, being responsible for the generation of huge amounts of data. Spam traffic, for example, accounts for terabytes of data daily. It becomes n
Autor:
Osvaldo Fonseca, Wagner Meira, Klaus Steding-Jessen, Marcelo H. P. C. Chaves, Elverton Fazzion, Dorgival Guedes, Cristine Hoepers, Pedro Las-Casas
Publikováno v:
SBRC
Despite the continuous efforts to mitigate spam, the volume of messages is huge and identifying spammers is still a challenge. Spam traffic analysis has been performed to determine the behavior of spammers, who are employing techniques more and more