Sciweavers

1085 search results - page 101 / 217
» A Timing Attack on RC5
Sort
View
AWCC
2004
Springer
15 years 3 months ago
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of informa...
Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hu...
IPPS
2003
IEEE
15 years 3 months ago
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems
In this paper we propose a new resource discovery protocol, REALTOR, which is based on a combination of pullbased and push-based resource information dissemination. REALTOR has be...
Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
DSN
2007
IEEE
15 years 1 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
ICISC
2004
169views Cryptology» more  ICISC 2004»
14 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
ISW
2007
Springer
15 years 4 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...