Forgot your password?
typodupeerror

Comment: Re:No... (Score 1) 116

by whiteworm (#37804948) Attached to: Tipping Point For Open Access CS Research?
arXiv holds pre-prints, and several fields, including some CS research, not only Physics uses the service. It doesn't count as publication in the academic world, since papers are not reviewed, so the entire edifice by which scholars get credit for their work doesn't apply. The open access movement, on the other hand, does apply to publications that count toward a scholar's reviewed work. Physics as a field, incidentally, is one of the more hide-bound in terms of adopting new publication schemes.

Comment: Re:What is Google's interest? Data Tracking? (Score 2, Interesting) 363

by whiteworm (#31088912) Attached to: Google's Experimental Fiber Network
Mtn. Vw's neighboring town, Palo Alto installed a fiber loop abt 10 yrs ago that sadly remains largely dark, except for several proximate firms that have rented access from the city. For instance, Facebook hdquarters had a tap installed when they moved. I don't think Google can follow, since it isn't sitting near the Palo Alto loop anywhere, however.

Comment: Re:Not so fast... (Score 1) 116

by whiteworm (#26467779) Attached to: A Cheap, Distributed Zero-Day Defense?
Actually it would help detecting distributed attacks, since it is looking for a combination of small increments of traffic on numerous machines. Small, unreliable detections averaged over many machines equals a significant, reliable detection. This is having the law of large numbers on your side. Again, much of the work on distributed worm detection has been published, I recommend folks read it before spewing speculation. -JMA

Comment: Re:what a useless article (Score 2, Insightful) 116

by whiteworm (#26455163) Attached to: A Cheap, Distributed Zero-Day Defense?
Yes, I'll agree the article isn't revealing. The difference between our work and "Autograph" type approaches that WormShield builds on is that we are doing traffic anomaly detection and these more involved approaches attempt to automatically build a signature. The paper is available (only, sigh) from Springer, in "Recent Advances in Intrusion Detection 11th International Symposium", RAID 2008, Cambridge, MA, USA. -JMA

When speculation has done its worst, two plus two still equals four. -- S. Johnson

Working...