133
Voted
NDSS
15 years 6 months ago
2008 IEEE 125
Voted
NDSS
15 years 6 months ago
2008 IEEE
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
109
click to vote
NDSS
15 years 6 months ago
2008 IEEE
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
113
Voted
NDSS
15 years 6 months ago
2008 IEEE
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
115
Voted
NDSS
15 years 6 months ago
2008 IEEE
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
|