Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1101
search results - page 2 / 221
»
On the Security and Vulnerability of PING
Sort
relevance
views
votes
recent
update
View
thumb
title
13
click to vote
IJNSEC
2007
130
views
more
IJNSEC 2007
»
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
13 years 5 months ago
Download
ijns.femto.com.tw
802.1x is a security protocol based on the frame structure
Ping Ding
claim paper
Read More »
13
click to vote
CTRSA
2001
Springer
139
views
Cryptology
»
more
CTRSA 2001
»
Security Weaknesses in Bluetooth
13 years 9 months ago
Download
www.cse.sc.edu
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
claim paper
Read More »
26
click to vote
HICSS
2011
IEEE
190
views
Biometrics
»
more
HICSS 2011
»
Validating Cyber Security Requirements: A Case Study
12 years 9 months ago
Download
info.ornl.gov
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
claim paper
Read More »
6
click to vote
CRITIS
2006
80
views
Security Privacy
»
more
CRITIS 2006
»
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
13 years 9 months ago
Download
www.isac.uma.es
Roland Rieke
claim paper
Read More »
9
click to vote
CRITIS
2006
104
views
Security Privacy
»
more
CRITIS 2006
»
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
13 years 9 months ago
Download
critis06.lcc.uma.es
Christos Xenakis, Lazaros F. Merakos
claim paper
Read More »
« Prev
« First
page 2 / 221
Last »
Next »