Sciweavers

499 search results - page 68 / 100
» A Study on Latent Vulnerabilities
Sort
View
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 4 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
CCS
2006
ACM
15 years 4 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
EUROCRYPT
2006
Springer
15 years 4 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
WICON
2008
15 years 1 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar
90
Voted
IGARSS
2009
14 years 10 months ago
Developing New Spectral Indices for Karst Rocky Desertification Monitoring in Southwest China
Karst rocky desertification is a special kind of land desertification developed under violent human impacts on the vulnerable eco-geo-environment of karst ecosystem. The fractiona...
Yuemin Yue, Kelin Wang, Junsheng Li, Bing Zhang, B...