Sciweavers

912 search results - page 1 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
IC
2000
13 years 6 months ago
Techniques for Securing Networks Against Criminal Attacks
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
WEBNET
2001
13 years 6 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...
CCS
2008
ACM
13 years 6 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
13 years 10 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
CCS
2010
ACM
13 years 6 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...