Sciweavers

388 search results - page 1 / 78
» Attacks and Defenses for JTAG
Sort
View
DT
2010
84views more  DT 2010»
13 years 6 months ago
Attacks and Defenses for JTAG
Kurt Rosenfeld, Ramesh Karri
CN
2011
129views more  CN 2011»
13 years 29 days ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
DSN
2011
IEEE
12 years 5 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 9 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 28 days ago
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Pat...