Sciweavers

11 search results - page 1 / 3
» Identification of Repeated Denial of Service Attacks
Sort
View
INFOCOM
2006
IEEE
13 years 10 months ago
Identification of Repeated Denial of Service Attacks
Alefiya Hussain, John S. Heidemann, Christos Papad...
ACSAC
2002
IEEE
13 years 9 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
HPCA
2005
IEEE
13 years 10 months ago
Heat Stroke: Power-Density-Based Denial of Service in SMT
In the past, there have been several denial-of-service (DOS) attacks which exhaust some shared resource (e.g., physical memory, process table, file descriptors, TCP connections) ...
Jahangir Hasan, Ankit Jalote, T. N. Vijaykumar, Ca...
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 4 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
PERCOM
2004
ACM
14 years 4 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...