Sciweavers

21 search results - page 2 / 5
» Vulnerabilities and Security Limitations of current IP Telep...
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CCS
2007
ACM
13 years 11 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CN
2007
137views more  CN 2007»
13 years 5 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ICC
2007
IEEE
125views Communications» more  ICC 2007»
13 years 11 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...
INFOCOM
2009
IEEE
13 years 12 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang