Grand Valley State University

Displaying 1-3 of 3 results

  • White Papers // May 2012

    Abnormally Malicious Autonomous Systems and their Internet Connectivity

    While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile Autonomous System (AS) de-peerings and network shutdowns. In this paper, the authors explore whether some ASes indeed are safe havens for malicious activity. They look for ISPs and ASes that exhibit...

    Provided By Grand Valley State University

  • White Papers // Feb 2009

    Persistence Of The "Compass Rose" In The Stock Market

    The "Compass Rose" pattern appears in a scatter-plot chart where daily stock returns are plotted against themselves with a one day lag. Evenly spaced straight lines radiate from the origin in the major directions of the compass. These patterns appeared for every stock traded on the New York Stock Exchange...

    Provided By Grand Valley State University

  • White Papers // Jan 2007

    A Classification of E-Business Applications: Preliminary Results

    Predictions that SMEs would be the primary beneficiaries of e-business have not materialized. One of the main reasons is the failure to understand the value of e-business in the SME environment. Researchers have argued that a classification of the myriad of possible e-business applications is a necessary first step in...

    Provided By Grand Valley State University

  • White Papers // Feb 2009

    Persistence Of The "Compass Rose" In The Stock Market

    The "Compass Rose" pattern appears in a scatter-plot chart where daily stock returns are plotted against themselves with a one day lag. Evenly spaced straight lines radiate from the origin in the major directions of the compass. These patterns appeared for every stock traded on the New York Stock Exchange...

    Provided By Grand Valley State University

  • White Papers // Jan 2007

    A Classification of E-Business Applications: Preliminary Results

    Predictions that SMEs would be the primary beneficiaries of e-business have not materialized. One of the main reasons is the failure to understand the value of e-business in the SME environment. Researchers have argued that a classification of the myriad of possible e-business applications is a necessary first step in...

    Provided By Grand Valley State University

  • White Papers // May 2012

    Abnormally Malicious Autonomous Systems and their Internet Connectivity

    While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile Autonomous System (AS) de-peerings and network shutdowns. In this paper, the authors explore whether some ASes indeed are safe havens for malicious activity. They look for ISPs and ASes that exhibit...

    Provided By Grand Valley State University