Sciweavers

2503 search results - page 198 / 501
» Building Computer Network Attacks
Sort
View
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 6 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
15 years 8 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 8 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
133
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
EUC
2005
Springer
15 years 7 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...