Sciweavers

1342 search results - page 26 / 269
» Attacks are Protocols Too
Sort
View
COMPSEC
2006
56views more  COMPSEC 2006»
14 years 11 months ago
A new protocol to counter online dictionary attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
JISE
2006
37views more  JISE 2006»
14 years 11 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
ICNS
2007
IEEE
15 years 6 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
LCN
2005
IEEE
15 years 5 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed