Sciweavers

263 search results - page 40 / 53
» Adaptive Defense Against Various Network Attacks
Sort
View
AINA
2010
IEEE
15 years 2 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
INFOCOM
2008
IEEE
15 years 3 months ago
Robust Distributed Spectrum Sensing in Cognitive Radio Networks
Abstract—Distributed spectrum sensing (DSS) enables a Cognitive Radio (CR) network to reliably detect licensed users and avoid causing interference to licensed communications. Th...
Ruiliang Chen, Jung Min Park, Kaigui Bian
SIGOPSE
2004
ACM
15 years 2 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
ICASSP
2010
IEEE
14 years 7 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ISW
2007
Springer
15 years 3 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...