Sciweavers

12183 search results - page 3 / 2437
» Computers under Attacks!
Sort
View
MCS
2010
Springer
13 years 7 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli
CN
2007
80views more  CN 2007»
13 years 5 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
PDCAT
2004
Springer
13 years 11 months ago
Attack Resiliency of Network Topologies
Network topology has no direct effect on the correctness of network protocols, however, it influences on the performance of networks and the survivability of the networks under at...
Heejo Lee, Jong Kim
FOSSACS
2006
Springer
13 years 9 months ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...
SERSCISA
2009
Springer
14 years 8 days ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim