Sciweavers

483 search results - page 88 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
VTC
2007
IEEE
15 years 3 months ago
Using Shared Beacon Channel for Fast Handoff in IEEE 802.11 Wireless Networks
— Handoff process in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). Previous resear...
Jaeouk Ok, Pedro Morales, Andreas Darmawan, Hiroyu...
ICNP
2006
IEEE
15 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
CCS
2009
ACM
15 years 4 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
15 years 3 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...