Sciweavers

263 search results - page 23 / 53
» Adaptive Defense Against Various Network Attacks
Sort
View
96
Voted
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
15 years 5 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
106
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System
— While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam s...
Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li
108
Voted
WETICE
2007
IEEE
15 years 6 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
134
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 10 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 6 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton