Sciweavers

2503 search results - page 178 / 501
» Building Computer Network Attacks
Sort
View
IEEEARES
2009
IEEE
15 years 8 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
AINA
2007
IEEE
15 years 8 months ago
Recovery Protocols for Replicated Databases - A Survey
The main goal of replication is to increase dependability. Recovery protocols are a critical building block for realizing this goal. In this survey, we present an analysis of reco...
Luis H. García-Muñoz, José En...
98
Voted
DSN
2006
IEEE
15 years 8 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
117
Voted
MSWIM
2006
ACM
15 years 7 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
136
Voted
ICDCS
2003
IEEE
15 years 7 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu