156
Voted
NDSS
15 years 10 months ago
2008 IEEE 154
Voted
NDSS
15 years 10 months ago
2008 IEEE
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
148
Voted
NDSS
15 years 10 months ago
2008 IEEE
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
158
Voted
NDSS
15 years 10 months ago
2008 IEEE
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
142
Voted
NDSS
15 years 10 months ago
2008 IEEE
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
|