Sciweavers

2503 search results - page 16 / 501
» Building Computer Network Attacks
Sort
View
LCN
2000
IEEE
15 years 2 months ago
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks
Antonio F. Gómez-Skarmeta, Angel L. Mateo-M...
79
Voted
AINA
2006
IEEE
15 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
91
Voted
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ALGOSENSORS
2007
Springer
14 years 11 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...