Sciweavers

101 search results - page 20 / 21
» How to Increase Security in Mobile Networks by Anomaly Detec...
Sort
View
ACSAC
2010
IEEE
13 years 4 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 6 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 4 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
COSIT
2001
Springer
142views GIS» more  COSIT 2001»
13 years 10 months ago
The Utility of Global Representations in a Cognitive Map
In this paper we propose the use of small global memory for a viewer’s immediate surroundings to assist in recognising places that have been visited previously. We call this glob...
Margaret E. Jefferies, Wai K. Yeap
CCS
2009
ACM
14 years 29 days ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...