Sciweavers

12183 search results - page 1 / 2437
» Computers under Attacks!
Sort
View
DSN
2007
IEEE
13 years 11 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu
CAISE
2006
Springer
13 years 8 months ago
Computers under Attacks!
The war metaphor seems to establish itself as soon as we deal with computer viruses. The concept of war is a central topic of political philosophy. The relationships between "...
Anne Bonfante, Jean-Yves Marion
CCR
2010
133views more  CCR 2010»
13 years 4 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
WIOPT
2010
IEEE
13 years 3 months ago
Wireless jamming attacks under dynamic traffic uncertainty
Yalin Evren Sagduyu, Randall A. Berry, Anthony Eph...
PERCOM
2004
ACM
14 years 4 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...