Sciweavers

499 search results - page 69 / 100
» A Study on Latent Vulnerabilities
Sort
View
96
Voted
ICSE
2008
IEEE-ACM
16 years 16 days ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
ICC
2007
IEEE
15 years 6 months ago
Performance of Dedicated Path Protection in Transmission-Impaired DWDM Networks
— There has been a significant amount of recent research on routing and wavelength assignment for DWDM networks suffering from physical layer transmission impairments. These alg...
Yuxiang Zhai, Yvan Pointurier, Suresh Subramaniam,...
100
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
131
Voted
TARK
2007
Springer
15 years 6 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
102
Voted
IISWC
2006
IEEE
15 years 6 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...