Sciweavers

1085 search results - page 119 / 217
» A Timing Attack on RC5
Sort
View
HAPTICS
2007
IEEE
15 years 4 months ago
Human Performance in a Knob-Turning Task
Knob turning is a common task that should influence the design of human-machine interfaces such as prosthetic arms, teleoperated robots, and virtual environments. This study exam...
Netta Gurari, Allison M. Okamura
ICNSC
2007
IEEE
15 years 4 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen
CCS
2007
ACM
15 years 4 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
MIDDLEWARE
2007
Springer
15 years 4 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
DSN
2006
IEEE
15 years 4 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh