Sciweavers

13 search results - page 1 / 3
» Classifying RFID attacks and defenses
Sort
View
ISF
2010
232views more  ISF 2010»
13 years 1 months ago
Classifying RFID attacks and defenses
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
CCR
2004
164views more  CCR 2004»
13 years 4 months ago
A taxonomy of DDoS attack and DDoS defense mechanisms
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents tw...
Jelena Mirkovic, Peter L. Reiher
ACSAC
2006
IEEE
13 years 10 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
FC
2007
Springer
111views Cryptology» more  FC 2007»
13 years 10 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
JMLR
2010
185views more  JMLR 2010»
12 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto