Sciweavers

507 search results - page 43 / 102
» Attacking DDoS at the Source
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
NSDI
2008
15 years 18 hour ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
62
Voted
ACSC
2005
IEEE
15 years 3 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta
VLDB
2001
ACM
121views Database» more  VLDB 2001»
15 years 2 months ago
Answering XML Queries on Heterogeneous Data Sources
ct Information Integration is among the most important fields in information management. The problem of integrating data from diverse, possibly heterogeneous data sources is ubiqu...
Ioana Manolescu, Daniela Florescu, Donald Kossmann
72
Voted
CORR
2007
Springer
119views Education» more  CORR 2007»
14 years 9 months ago
Distributed Source Coding in the Presence of Byzantine Sensors
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...
Oliver Kosut, Lang Tong