Sciweavers

483 search results - page 26 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
LCN
2007
IEEE
15 years 3 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
DIMVA
2009
14 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
IEEESCC
2009
IEEE
15 years 4 months ago
Service Composition Based on Natural Language Requests
—The easiest way for a user to express his needs regarding a desired service is to use natural language. The main issues come from the fact that the natural language is incomplet...
Marcel Cremene, Jean-Yves Tigli, Stephane Lavirott...
ADC
2010
Springer
204views Database» more  ADC 2010»
14 years 4 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
TSE
2010
156views more  TSE 2010»
14 years 7 months ago
Discovering Services during Service-Based System Design Using UML
—Recently, there has been a proliferation of service-based systems, i.e. software systems that are composed of autonomous services, but can also use software code. In order to su...
George Spanoudakis, Andrea Zisman